Projects STRLCPY KBlast Files
Enable build support by adding .buildspec.yml
KBlast Loading last commit info...


Static Badge Static Badge Static Badge

Windows Kernel Offensive Toolset

KBlast is a small application I built while experimenting with Windows kernel offensive security techniques. It puts together almost all the techniques discussed in the Offensive Driver Development course from Zero Point Security, plus some extra techniques. I thought that building up this tool rather than writing down a cheatsheet was a better way to both put into practice the concepts learned and provide the community with a comprehensive learning resource.

    __ __ ____  __           __
   / //_// __ )/ /___ ______/ /_        | KBlast client - OS Build #19045 - Major version #10
  / ,<  / __  / / __ `/ ___/ __/        | Version : 1.0 ( first release ) - Architecture : x64
 / /| |/ /_/ / / /_/ (__  ) /_          | Website :
/_/ |_/_____/_/\__,_/____/\__/          | Author  : lem0nSec_
KBlast > tokn|help

Commands - ' tokn ' ( token manipulation interactions )

        enablepriv:     Enable all privileges for a given process
        disablepriv:    Disable all privileges for a given process
             steal:     Steal token and give it to a given process
           restore:     Restore the original token of a given process


$ tokn|enablepriv|123 - ( enable all privileges for process 123 )
$ tokn|disablepriv|123 - ( disable all privileges for process 123 )
$ tokn|steal|4|123 - ( replace 123's token with System's [ 4 ] )
$ tokn|restore|123 - ( restore 123's token [ ! experimental ! ] )

KBlast >

How it works

This tool has two components. KBlaster.sys is the application's driver, the actual core where all central features reside. In contrast, KBlast.exe is the client application. KBlast.exe takes user commands, generate a specific input to be sent to KBlaster, and once the driver has finished its operation the client may or may not return the result of the operation depending on what was done.

Commands and Features

KBlast commands can fall into four categories which must be prepended to the actual command (generic commands can be just typed and run right away). Categories can be:

  • misc (misc functionalities, es. memory read/write)
  • prot (protection PPL)
  • tokn (token management)
  • call (kernel callbacks)

The fun part is that some misc functionalities can be combined with commands from other modules, thus offering a chance to diversify already known approaches.


The following screenshot shows the swapping of a high-integrity powershell token with a system-level token (System process pid 4).

The following screenshot shows the elevation of mimikatz PPL to LSA. Mimikatz is now granted read access to lsass.

Installation Notes

Since KBlaster.sys is just a driver I built for my own learning, it does not come with signing. Enabling testsigning mode with the following command is required to play with this tool.

  • bcdedit /set testsigning on

Important note ⚠️

This tool is still at an early stage of development. KBlast is being actively tested on a Windows 10 Pro build 19045 x64 machine. Some functionalities support other Windows versions. Others don't. To clarify, the following is the output of 'version' command on the system I'm using to build the tool.

KBlast > version
Architecture : x64
Build number : 19045
Major version : 10
Minor version : 0
Platform ID : 2

Since the Windows Kernel is mostly composed of 'opaque' data structures, this tool is likely to trigger bsods at this stage of development if a version other than the one mentioned is used. Development of these tools often requires months. I hope you understand and appreciate the project and the idea behind! Last but not least, I might consider adding new features such as process hiding if the project will turn out a useful resource for learners.

Please wait...
Page is in error, reload to recover