{"uuid": "f7861039-ceae-40e8-9aee-b604c6f612e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-21551", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2237", "content": "#Cobalt_Strike \n\n\u200b\u200bkernel-mii\n\nCobalt Strike Beacon Object File foundation for kernel exploitation using CVE-2021-21551.\n\nThis is a Cobalt Strike (CS) Beacon Object File (BOF) which exploits CVE-2021-21551. It only overwrites the beacon process token with the system process token. But this BOF is mostly just a good foundation for further kernel exploitation via CS.\n\nhttps://github.com/tijme/kernel-mii\n\n@BlueRedTeam", "creation_timestamp": "2022-07-16T22:12:04.000000Z"}