Skip to content

Algorithm99root/-Privilege-escalation-for-Rootkit-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 

Repository files navigation

🚀 sys_root.exe — From User to SYSTEM: [Your Gateway to Planting a Rootkit in the Targeted System] 💻🕵️‍♂️ sys_root.exe — a sneaky little exploit that doesn’t play in the safe sandbox of user space. Its mission? → 🚨 Privilege Escalation It takes you from an ordinary user 🧑‍💻 to NT AUTHORITY\SYSTEM — Windows’ god-mode access 👑.

😈 Now Here’s Where the Fun Begins... Rootkits aren’t your typical .exe files. They’re usually kernel-mode drivers — like rootkit.sys 🔧. These bad boys don’t run in Ring 3 with your average apps. They need to operate in Ring 0, the kernel’s inner sanctum 🧠 — where the real power lies.

But of course, Windows doesn’t make that easy... To load into Ring 0, you must first bypass:

🛑 DSE (Driver Signature Enforcement) A hard stop for any unsigned driver trying to enter the kernel.

✨ This Is Where sys_root.exe Shines With SYSTEM-level privileges already in your pocket 💼, sys_root.exe can bypass DSE by:

🔧 Patching kernel memory 🧩 Exploiting vulnerable drivers 🕳️ Leveraging legacy flaws

And once DSE is down... it’s game over:

✅ rootkit.sys is loaded ✅ Code is running in Ring 0 ✅ Target system is compromised ✅ 🫥 Stealth, persistence, and full control achieved

bandicam.2025-06-09.12-47-34-548.mp4

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published