x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
anycall x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration Read: wwwgodeyeclub/2021/05/14/001-x64-windows-kernel-code-execution-via-userhtml How it works Allocate physical memory to user virtual memory Allows user-process to manupulate arbitrary physical memory without calling APIs Search entire physical memory