NT KERNEL RESEARCH HUB

ntos.rest

Windows internals.
Reverse engineering.
Ironclad defense.

Watch the kernel
ntoskrnl.exe
EDR bypass
Driver analysis
Memory forensics
WINDBG • x64

$ dt nt!_EPROCESS

ImageFileName: "explorer.exe"

DirectoryTableBase: 0x1a2b3c...

Kernel loaded at 0xfffff807`00000000

ntoskrnl.exe • May 2026 build

LIVE KERNEL ANALYSIS

The operating system is just the beginning.

ntos.rest is your no-nonsense hub for Windows security research. We break down the NT kernel, reverse real-world binaries, and teach you how to defend against modern threats.

10+

Kernel modules dissected

47

EDR techniques covered

Whether you're a red-teamer hunting for kernel callbacks, a blue-teamer building detection logic, or a student trying to understand why ObRegisterCallbacks matters — this is the place.

No fluff. Just deep technical truth about Windows NT.

Windows Internals

FULL ARCHIVE
🪟

Kernel Architecture

Process creation, thread scheduling, object manager, executive services, and the HAL.

nt!Ke* APIs
🧠

Memory Management

Virtual address spaces, paging structures, pool allocations, and modern mitigations (CET, HVCI).

Mm* & Ex* routines
🚗

Driver Model & I/O

KMDF, WDF, filter drivers, IRP handling, and how modern rootkits hide inside the kernel.

WDF + minifilters

Reverse Engineering

Tools of the Trade

IDA Pro, Ghidra, x64dbg, WinDbg Preview, Binary Ninja, and custom kernel debuggers.

Techniques

Static + dynamic analysis, unpacking, anti-anti-debug, symbolic execution, and kernel RE workflows.

Real-World Cases

Dissecting recent malware, analyzing signed driver abuse, and mapping undocumented NT APIs.

Defense & Blue Team

Modern Mitigations

ASLR, CFG, CET, HVCI, Kernel Data Protection, and how attackers still bypass them.

EDR / XDR Detection

Callback monitoring, ETW, Sysmon, AMSI, and writing your own behavioral rules.

Forensics & Response

Memory dumping, Volatility, kernel live forensics, and incident response playbooks.

Free Resources

Latest Research

May 18, 2026

Mapping undocumented ETW providers in Windows 11 24H2

We reverse-engineered 14 new telemetry providers and show you how defenders can abuse them for better visibility.

12 min read Read full post
May 12, 2026

Bypassing HVCI with a signed vulnerable driver (still works in 2026)

Step-by-step analysis of a new Bring-Your-Own-Vulnerable-Driver attack chain.

18 min read Read full post
May 05, 2026

Inside the new Windows 11 kernel object manager changes

What changed in ObpCreateObject and why it matters for rootkit developers and defenders.

9 min read Read full post

Stay in the kernel

Monthly deep dives, new research drops, and early access to tools. No spam — just signal.

🔒 Your email is safe. You can unsubscribe anytime.