Aktualizacja: 2025-10-02 08:38:40
This commit is contained in:
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// Add these functions to CommunicationLayer.cpp or create separate BannerSystem.cpp
|
// Add these functions to CommunicationLayer.cpp or create separate BannerSystem.cpp
|
||||||
|
|
||||||
#include <Windows.h>
|
#include <Windows.h>
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// BrowserCrypto.cpp - Browser-specific cryptographic operations
|
// BrowserCrypto.cpp - Browser-specific cryptographic operations
|
||||||
// Implements selective COM/DPAPI strategy based on browser and data type
|
// Implements selective COM/DPAPI strategy based on browser and data type
|
||||||
#include "BrowserCrypto.h"
|
#include "BrowserCrypto.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// BrowserHelp.cpp - Comprehensive help system for PassExtractor
|
// BrowserHelp.cpp - Comprehensive help system for PassExtractor
|
||||||
#include <windows.h>
|
#include <windows.h>
|
||||||
#include "BrowserHelp.h"
|
#include "BrowserHelp.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// BrowserProcessManager.cpp - Browser process management and cleanup operations
|
// BrowserProcessManager.cpp - Browser process management and cleanup operations
|
||||||
#include "BrowserProcessManager.h"
|
#include "BrowserProcessManager.h"
|
||||||
#include "syscalls.h"
|
#include "syscalls.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// CommunicationLayer.cpp - Console and pipe communication implementation
|
// CommunicationLayer.cpp - Console and pipe communication implementation
|
||||||
#include "CommunicationLayer.h"
|
#include "CommunicationLayer.h"
|
||||||
#include "syscalls.h"
|
#include "syscalls.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// CommunicationModule.cpp - Pipe communication and utility functions
|
// CommunicationModule.cpp - Pipe communication and utility functions
|
||||||
#include "CommunicationModule.h"
|
#include "CommunicationModule.h"
|
||||||
#include <ShlObj.h>
|
#include <ShlObj.h>
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// ControllerBinaryManager.cpp - Fixed compilation issues
|
// ControllerBinaryManager.cpp - Fixed compilation issues
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// ControllerCore.cpp
|
// ControllerCore.cpp
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// ControllerDriverManager.cpp
|
// ControllerDriverManager.cpp
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// ControllerMemoryOperations.cpp
|
// ControllerMemoryOperations.cpp
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "ReportExporter.h"
|
#include "ReportExporter.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// ControllerProcessOperations.cpp
|
// ControllerProcessOperations.cpp
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// ControllerSystemIntegration.cpp
|
// ControllerSystemIntegration.cpp
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// CryptCore.cpp - Security module entry point and workflow coordination
|
// CryptCore.cpp - Security module entry point and workflow coordination
|
||||||
// Implements split-key strategy for Edge: COM for cookies/payments, DPAPI for passwords
|
// Implements split-key strategy for Edge: COM for cookies/payments, DPAPI for passwords
|
||||||
#include "CryptCore.h"
|
#include "CryptCore.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// DataExtraction.cpp - Profile discovery and database extraction
|
// DataExtraction.cpp - Profile discovery and database extraction
|
||||||
#include "DataExtraction.h"
|
#include "DataExtraction.h"
|
||||||
#include "BrowserCrypto.h"
|
#include "BrowserCrypto.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include "DefenderManager.h"
|
#include "DefenderManager.h"
|
||||||
#include <filesystem>
|
#include <filesystem>
|
||||||
#include <algorithm>
|
#include <algorithm>
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// EdgeDPAPI.cpp - DPAPI decryption for Edge browser password keys
|
// EdgeDPAPI.cpp - DPAPI decryption for Edge browser password keys
|
||||||
// Implements orchestrator-side password key extraction using Windows DPAPI
|
// Implements orchestrator-side password key extraction using Windows DPAPI
|
||||||
#include "EdgeDPAPI.h"
|
#include "EdgeDPAPI.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include <windows.h>
|
#include <windows.h>
|
||||||
#include "HelpSystem.h"
|
#include "HelpSystem.h"
|
||||||
#include <iostream>
|
#include <iostream>
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// InjectionEngine.cpp - Low-level PE injection and execution
|
// InjectionEngine.cpp - Low-level PE injection and execution
|
||||||
#include "InjectionEngine.h"
|
#include "InjectionEngine.h"
|
||||||
#include "syscalls.h"
|
#include "syscalls.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include "KeyboardHook.h"
|
#include "KeyboardHook.h"
|
||||||
#include "TrustedInstallerIntegrator.h"
|
#include "TrustedInstallerIntegrator.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
25
kvc/Kvc.cpp
25
kvc/Kvc.cpp
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "DefenderManager.h"
|
#include "DefenderManager.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// KvcDrv.cpp
|
// KvcDrv.cpp
|
||||||
#include "kvcDrv.h"
|
#include "kvcDrv.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include <iostream>
|
#include <iostream>
|
||||||
#include <fstream>
|
#include <fstream>
|
||||||
#include <vector>
|
#include <vector>
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// OffsetFinder.cpp
|
// OffsetFinder.cpp
|
||||||
#include "OffsetFinder.h"
|
#include "OffsetFinder.h"
|
||||||
#include "Utils.h"
|
#include "Utils.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// OrchestratorCore.cpp - Main orchestration and application entry point
|
// OrchestratorCore.cpp - Main orchestration and application entry point
|
||||||
// Coordinates process management, injection, and extraction workflow
|
// Coordinates process management, injection, and extraction workflow
|
||||||
#include "OrchestratorCore.h"
|
#include "OrchestratorCore.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// ProcessManager.cpp
|
// ProcessManager.cpp
|
||||||
#include "ProcessManager.h"
|
#include "ProcessManager.h"
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include "ReportExporter.h"
|
#include "ReportExporter.h"
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include <filesystem>
|
#include <filesystem>
|
||||||
|
|||||||
@@ -1,4 +1,29 @@
|
|||||||
// SelfLoader.cpp
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
|
// SelfLoader.cpp
|
||||||
#include <windows.h>
|
#include <windows.h>
|
||||||
#include <algorithm>
|
#include <algorithm>
|
||||||
#include <cstring>
|
#include <cstring>
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include "ServiceManager.h"
|
#include "ServiceManager.h"
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
#include "KeyboardHook.h"
|
#include "KeyboardHook.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// SessionManager.cpp
|
// SessionManager.cpp
|
||||||
#include "SessionManager.h"
|
#include "SessionManager.h"
|
||||||
#include "Controller.h"
|
#include "Controller.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
#include "TrustedInstallerIntegrator.h"
|
#include "TrustedInstallerIntegrator.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
#include <tchar.h>
|
#include <tchar.h>
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// Utils.cpp - Fixed compilation issues with NtQuerySystemInformation
|
// Utils.cpp - Fixed compilation issues with NtQuerySystemInformation
|
||||||
#include "Utils.h"
|
#include "Utils.h"
|
||||||
#include "common.h"
|
#include "common.h"
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// common.cpp - Core system utilities and dynamic API management
|
// common.cpp - Core system utilities and dynamic API management
|
||||||
// Implements service management, system path resolution, and Windows API abstraction
|
// Implements service management, system path resolution, and Windows API abstraction
|
||||||
|
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
/*******************************************************************************
|
||||||
|
_ ____ ______
|
||||||
|
| |/ /\ \ / / ___|
|
||||||
|
| ' / \ \ / / |
|
||||||
|
| . \ \ V /| |___
|
||||||
|
|_|\_\ \_/ \____|
|
||||||
|
|
||||||
|
The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research,
|
||||||
|
offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived
|
||||||
|
as "Kernel Process Control," the framework has evolved to emphasize not just control, but the complete **exploitation
|
||||||
|
of kernel-level primitives** for legitimate security research and penetration testing.
|
||||||
|
|
||||||
|
KVC addresses the critical gap left by traditional forensic tools that have become obsolete in the face of modern Windows
|
||||||
|
security hardening. Where tools like ProcDump and Process Explorer fail against Protected Process Light (PPL) and Antimalware
|
||||||
|
Protected Interface (AMSI) boundaries, KVC succeeds by operating at the kernel level, manipulating the very structures
|
||||||
|
that define these protections.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------------
|
||||||
|
Author : Marek Wesołowski
|
||||||
|
Email : marek@wesolowski.eu.org
|
||||||
|
Phone : +48 607 440 283 (Tel/WhatsApp)
|
||||||
|
Date : 04-09-2025
|
||||||
|
|
||||||
|
*******************************************************************************/
|
||||||
|
|
||||||
// syscalls.cpp
|
// syscalls.cpp
|
||||||
#include "syscalls.h"
|
#include "syscalls.h"
|
||||||
#include <vector>
|
#include <vector>
|
||||||
|
|||||||
Reference in New Issue
Block a user