Skip to content

splintersfury/KernelSight

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

48 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

KernelSight — Windows Kernel Driver Exploitation Knowledge Base

GitHub Pages CVEs Drivers ITW License: MIT

A structured knowledge base for Windows kernel driver exploitation -- covering vulnerability classes, exploitation primitives, BYOVD campaigns, exploit chain patterns, and kernel mitigations. Every entry is grounded in real CVEs with driver names, vulnerable/fixed builds, and patch analysis.

Browse the Knowledge Base →


Corpus

Metric Count
CVE case studies 134
Unique drivers analysed 62
Exploited in the wild 52
Remotely exploitable 2
BYOVD drivers 41
Driver type categories 12
Exploitation technique pages 57
AutoPiff detection rules 80+

What's Inside

The Exploitation Pipeline

KernelSight is organized as a pipeline from driver identification through privilege escalation:

Driver TypesAttack SurfacesVulnerability ClassesExploitation PrimitivesCase Studies

With Mitigations cross-cutting every stage.

Driver Types (12 Categories)

Driver Type Example Drivers CVEs Key Pattern
File System ntfs.sys, fastfat.sys, refs.sys 7 VHD mount gives unprivileged access to on-disk parsing
Minifilters cldflt.sys 8 Reparse data and cloud file callbacks
Log / Transaction clfs.sys 12 Most exploited single driver -- on-disk metadata corruption
Network Stack tcpip.sys, afd.sys, http.sys 13 Includes 2 remotely exploitable bugs (IPv6 RCE, HTTP RCE)
Kernel Streaming ks.sys, mskssrv.sys, ksthunk.sys 12 IOCTL handlers, MDL mapping, type confusion
Win32k win32k.sys, win32kbase.sys, win32kfull.sys 12 Callback reentrancy, window object races
Core Kernel ntoskrnl.exe 9 Token races, secure-mode bypasses, highest impact
Security / Policy appid.sys, ci.dll 2 Missing IOCTL access checks
Storage / Caching csc.sys, storvsp.sys 2 Logic bugs, PreviousMode manipulation
Vendor Utility RTCore64.sys, DBUtil_2_3.sys 15+ Physical memory mapping, MSR access -- BYOVD weapons
Performance & GPU dxgkrnl.sys, dwmcore.dll 8+ DMA, shared memory, kernel streaming
Third-Party Security Truesight.sys, amsdk.sys 5+ EDR bypass, process termination primitives

Guides

Deep Dives

Additional Sections

  • Attack Surfaces (9) -- IOCTL handlers, filesystem IRPs, NDIS/network, ALPC, shared memory, WMI/ETW
  • Vulnerability Classes (10) -- buffer overflow, UAF, type confusion, TOCTOU, race conditions, integer overflow
  • Exploitation Primitives (19) -- arbitrary R/W families + exploitation building blocks (pool spray, I/O Ring, WNF, token swap, PreviousMode)
  • Mitigations (9) -- SMEP/SMAP, kCFG/kCET, VBS/HVCI, KDP, pool hardening, KASLR
  • BYOVD -- Bring Your Own Vulnerable Driver attack pattern
  • Tooling -- static analysis, fuzzing, debugging, patch diffing, AutoPiff integration

Quick Start

Browse Online

Visit splintersfury.github.io/KernelSight -- no setup required.

Serve Locally

git clone https://github.com/splintersfury/KernelSight.git
cd KernelSight
pip install mkdocs-material
mkdocs serve
# Open http://localhost:8000

Related Projects

  • AutoPiff -- Automated Windows kernel driver patch diffing pipeline that feeds into KernelSight's case studies and detection rules
  • LOLDrivers -- Community-maintained catalogue of vulnerable and malicious drivers

Contributing

Contributions welcome -- whether adding a case study, documenting a new technique, or improving existing entries.

  1. Use the templates in templates/ as a starting point
  2. Follow the schema in index/techniques.yaml
  3. Cross-reference CVEs to techniques, techniques to mitigations
  4. Open a PR

License

MIT

About

Windows kernel driver exploitation knowledge base — 28 case studies organized by driver type, grounded in real CVEs with build numbers and PoC references

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors