wetw0rk
banner
wetw0rk7.bsky.social
wetw0rk
@wetw0rk7.bsky.social
Released my write for gaining a fundamental understanding of the Windows _SECURITY_DESCRIPTOR structure. I then created a custom Windows Kernel shellcode stub to perform process injection for privilege escalation which is also implemented in Sickle :P

wetw0rk.github.io/posts/unders...
Understanding the Windows _SECURITY_DESCRIPTOR
wetw0rk.github.io
October 22, 2025 at 2:33 PM
Trick or Treat!! Would you still love my malware if it was a worm 🥺❤️?

Sickle V4 has added a handler module for easy payload distribution and yes, you can do it over HTTPS!

Download it here: github.com/wetw0rk/Sick...
October 13, 2025 at 2:07 PM
Anyone hungry for a🍪? Today we learn about Stack Cookies! Also known as Canaries!

This will be the last tutorial within the Windows Kernel Exploitation series.

As of today all 10 tutorials are available for English speakers!

wetw0rk.github.io/posts/0x09-r...
0x09 - Return of the Windows Kernel Stack Overflow
In the last tutorial we exploited one of the most notorious bug classes in the entire industry - Race Conditions. In this tutorial we’re going back to a bug class we have exploited before - The Stack ...
wetw0rk.github.io
February 9, 2025 at 12:08 AM
Are you ready for an introduction to Windows Kernel Race Conditions?

You can find the tutorial below :)

wetw0rk.github.io/posts/0x07-i...
0x07 - Introduction to Windows Kernel Race Conditions
In the last tutorial we successfully exploited a Type Confusion vulnerability against Windows 11 (x64). In this tutorial we’ll introduce a new vulnerability type - a Race Condition, more specifically ...
wetw0rk.github.io
January 25, 2025 at 4:13 PM
Type Confusions pueden ser... difícil, especialmente cuando se trata de una versión más moderna de Windows. Hoy explotamos uno contra Windows 11 (x64). Un saludo a
@w4fz5uck5 y @xct_de! Por ayudarme a superar esto!

Puedes encontrar el tutorial aquí:

wetw0rk.github.io/posts/0x06-a...
0x06 - Acercándose a Windows Kernel Type Confusions Modernos
En el último tutorial explotamos una “Type Confusion” dentro del kernel de Windows 7 (x86). Habiendo obtenido un base sólido para esta vulnerabilidad, podemos proceder a intentar aprovechalo dentro de...
wetw0rk.github.io
January 20, 2025 at 4:38 AM
Type Confusions can be… confusing, especially when targeting a more modern version of Windows. Today we exploit one against Windows 11 (x64). Shoutout to @w4fz5uck5 and @xct_de for helping me get through this one!

You can find the tutorial here:

wetw0rk.github.io/posts/0x06-a...
0x06 - Approaching Modern Windows Kernel Type Confusions
In the last tutorial we exploited a Type Confusion within the Windows 7 (x86) Kernel. Having obtained a solid foundation on approaching this vulnerability, we can now proceed to attempt exploitation o...
wetw0rk.github.io
January 18, 2025 at 6:08 PM
Mmm… Hrmmmmm… Mmm… mmm… Mm! Oh-hoh! Perdóname. Estaba absorto en mis pensamientos. Esta semana veremos una introducción a Type Confusions dentro del kernel de Windows! Más específicamente Windows 7 (x86).

Puedes encontrar el tutorial aquí!

wetw0rk.github.io/posts/0x05-i...
0x05 - Introducción a Windows Kernel Type Confusion Vulnerabilidades
En el último tutorial aprovechamos un “Write-What-Where” o un “Escribir Qué Dónde” dentro de Windows 7 (x86) y Windows 11 (x64). Igual que en los últimos tutoriales, introduciremos una nueva falla en ...
wetw0rk.github.io
January 10, 2025 at 3:37 PM
Mmm… Hrmmmmm… Mmm… mmm… Mm! Oh-hoh! Forgive me. I was absorbed in thought. This week, we’ll get an Introduction to Type Confusions within the Windows Kernel! More specifically Windows 7 (x86).

You can find the link to the tutorial down below!

wetw0rk.github.io/posts/0x05-i...
0x05 - Introduction to Windows Kernel Type Confusion Vulnerabilities
In the last tutorial we exploited a “Write-What-Where” vulnerability within Windows 7 (x86) and Windows 11 (x64). As with previous tutorials we will begin exploiting a new flaw against the Windows 7 (...
wetw0rk.github.io
January 9, 2025 at 3:24 PM
Se me ocurrió algo más gracioso que 24… 25. Qué mejor manera de comenzar 2025 que con una introducción a una vulnerabilidad Write-What-Where dentro del kernel de Windows 7 (x86) y Windows 11 (x64)!

Puedes encontrar el tutorial aquí:

wetw0rk.github.io/posts/0x04-e...
0x04 - Introducción a Windows Kernel "Write What Where" Vulnerabilidades
Si has seguido los tutoriales desde el principio, sientete orgulloso de superar el “Use After Free” en el Windows Kernel! Ahora vamos a aprovechar un “Write What Where” vulnerabilidad en Windows 7 (x8...
wetw0rk.github.io
January 6, 2025 at 5:16 AM
I thought of something funnier than 24… 25. What better way to start 2025 than with an introduction to a Write-What-Where vulnerability within the Windows 7 (x86) and Windows 11 (x64) Kernel!

You can find the tutorial here:

wetw0rk.github.io/posts/0x04-w...
0x04 - Introduction to Windows Kernel Write What Where Vulnerabilities
First off, if you’re following the series from the start, great job getting past the Use After Free in the Windows Kernel! We’ll now be exploiting a Write What Where vulnerability on Windows 7 (x86) t...
wetw0rk.github.io
January 4, 2025 at 11:06 PM
La semana pasada aprovechamos una vulnerabilidad de heap en el Windows 7 (x86) Kernel. Esta semana, un sistema más moderno - Windows 11 (x64)!

El tutorial se puede encontrar aquí:

wetw0rk.github.io/posts/0x03-a...
0x03 - Acercándose al Heap Moderno del Windows Kernel
Habiendo aprovechado el UaF en Windows 7 (x86), hemos obtenido una idea sólida de cómo funciona esta vulnerabilidad, es hora de intentar esto en Windows 11 (x64). Es importante tener en cuenta que, au...
wetw0rk.github.io
December 21, 2024 at 10:25 PM
Last week, we successfully exploited a Windows Kernel vulnerability in the heap on a Windows 7 (x86) system. This week, we're targeting a more modern OS - Windows 11 (x64)!

Check out the tutorial here:

wetw0rk.github.io/posts/0x03-a...
0x03 - Approaching the Modern Windows Kernel Heap
Having exploited the UaF in Windows 7 (x86) we have obtained a solid idea of how this vulnerability works, it’s time to attempt exploitation on Windows 11 (x64). It’s important to note, although we co...
wetw0rk.github.io
December 21, 2024 at 10:24 PM
Sickle v3.1.0 is out!! Shellcode generation is now supported and I've added 9 new payloads including a reflective loader for Linux on both AARCH64 and x64! Along with a new module asm_shell which supports x86, x64, and AARCH64!

Check it out here:

github.com/wetw0rk/Sickle
GitHub - wetw0rk/Sickle: Payload development framework
Payload development framework. Contribute to wetw0rk/Sickle development by creating an account on GitHub.
github.com
December 17, 2024 at 6:11 AM
En la serie de Windows Kernel Exploitation hemos aprovechado la vulnerabilidad de “Stack Overflow” contra Windows 7 (x86) y Windows 11 (x64). Esta semana volveremos a Windows 7 (x86) y vamos a exploit un Use-After-Free dentro del Windows Kernel!

wetw0rk.github.io/posts/0x02-i...
0x02 - Introducción a Windows Kernel Use After Frees (UaFs)
Si has estado siguiendo la serie de Windows Kernel Exploitation consecutivamente, deberías haber exploited un Stack Overflow básico contra Windows 7 (x86) y Windows 10 (x64). Aunque este es un salto g...
wetw0rk.github.io
December 16, 2024 at 3:26 AM
So far in the Windows Kernel Exploitation series we have successfully exploited a Stack Overflow against both Windows 7 (x86) and Windows 11 (x64). This week you'll be getting an introduction on how to exploit a Use-After-Free within the Windows Kernel!

wetw0rk.github.io/posts/0x02-i...
0x02 - Introduction to Windows Kernel Use After Frees (UaFs)
If you’ve been following the series consecutively, by now you should have exploited a basic Stack Overflow both within Windows 7 (x86) and Windows 10 (x64). Although this is a major accomplishment the...
wetw0rk.github.io
December 15, 2024 at 12:49 AM
It’s that time of the year, when you put your elf on a shelf and your ELFs in memory. Sickle now supports payload generation for reflective ELF loading!

Currently AARCH64 (ARM64) and x86-64 supported.

May your ELF payloads never touch disk!

github.com/wetw0rk/Sickle
December 14, 2024 at 4:05 AM
Es hora de aprender a evitar las mitigaciones modernas de Windows! Como parte de este próximo tutorial, estoy revelando Violet Phosphorous, una técnica para evadir SMEP/VBS!

Puedes encontrar el primer tutorial aqí:

wetw0rk.github.io/posts/0x01-m...
0x01 - Matándo Windows Kernel Mitigaciones
Esto fue posible por trabajo duro y determinación. No te sientas frustrado si estas cosas no las entiendes inmediatamente, y recordarte la fuente de la verdad siempre será el código. Y, para nosotros,...
wetw0rk.github.io
December 8, 2024 at 10:18 PM
It's time to learn how to bypass the latest mitigations deployed on Windows. As part of this next tutorial, I am dropping Violet Phosphorous, a SMEP/VBS bypass tested against the latest Windows 11 (x64) build as of today!

You can find the post here:

wetw0rk.github.io/posts/0x01-k...
December 7, 2024 at 7:12 AM