WinInt Compilation

Note: Some posts are still in progress. Explanations may be inaccurate due to my limited knowledge of the area, if you notice anything incorrect, please let me know.


Elementary: Understanding Processes

In this blog we will cover how windows process works, their structure and how we can pivot to nt-authority system or any user through WinDbg. No exploitation here, it is only to get acquainted in the environment for future exploits!

Read more →

Arbritrary Write - HEVD (ft. Astharot15)

Learn how to exploit an arbritrary write throught a vulnerable driver to change token process and process protections. Windows 10 token hijacking & Windows 11 lsass dump

Read more →

Taking Back Control - Windows File Ownership

A deep dive into Widnows file ownership, the NT Security Reference Monitor (*SRM*), and how to programmatically reclaim access to system protected files in System32 from kernel internals to working C code.

Read more →