Abusing Vulnerable Drivers to Terminate Privileged Processes
Detailed analysis of how to exploit vulnerabilities in Windows drivers to terminate privileged processes and evade EDR and AV solutions through the abuse of the TrueSight.sys driver.
Pentester and Full-Stack developer passionate about offensive security
1 contribution in the year 2025
Hello! My name is Julio Ángel Ferrari, I’m from Seville and my alias in the hacking world is “T0X1Cx”. I’m a Full-Stack developer but passionate about offensive security since I was 14 years old. Currently, I’ve been working as a Pentester for 4 years and I hold certifications such as eJPT and eCPPTv2 (although I have a few more pending this year). 🎯
In my free time, I’m passionate about finding and reporting vulnerabilities, so I also have two CVEs: CVE-2024-34361 and CVE-2024-34362.
I also enjoy sharing knowledge: I’ve given talks at some high schools in Seville and have been a professor for the Cybersecurity Diploma at Loyola and the Master’s in AI and Data Analytics. 📚🤖
If you want to talk about hacking and any other topic, write to me on Telegram @T0X1Cx!
Detailed analysis of how to exploit vulnerabilities in Windows drivers to terminate privileged processes and evade EDR and AV solutions through the abuse of the TrueSight.sys driver.
This author has not published articles yet.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏