Complete Curriculum

A comprehensive path from setting up your lab to mastering advanced kernel exploitation techniques.

Module 1: Building a Secure Kernel Research Lab

Foundation

Module 2: Introduction to Windows Internals

Core Concepts

Module 3: Kernel Mitigations & Bypass (Part 1)

Exploitation

Module 4: Kernel Mitigations & Bypass (Part 2)

Advanced Exploitation

Module 5: Kernel Fuzzing & Reverse Engineering

Research

Module 6: Kernel Shellcode & Post-Exploitation

Weaponization
Enroll in the Academy