{"uuid": "d8583f34-2a11-4184-a5ba-c7c1464b6ae7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21551", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2242", "content": "#Cobalt_Strike \n\nkernel-mii\n\nCobalt Strike Beacon Object File foundation for kernel exploitation using CVE-2021-21551.\n\nThis is a Cobalt Strike (CS) Beacon Object File (BOF) which exploits CVE-2021-21551. It only overwrites the beacon process token with the system process token. But this BOF is mostly just a good foundation for further kernel exploitation via CS.\n\nhttps://github.com/NorthwaveSecurity/kernel-mii\n\n\n@BlueRedTeam", "creation_timestamp": "2022-07-19T21:02:29.000000Z"}