{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigy7neszhiq3r53676y4746ai3ausi5e7x2vr64o2tc5wpe24ot5e",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mmh4z466hn32"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreidd7eyg7y47szgzl3plgpcpjnabasevhiode4nsoyo76iff3v4fyq"
    },
    "mimeType": "image/jpeg",
    "size": 351549
  },
  "path": "/2026/05/making-vulnerable-drivers-exploitable.html",
  "publishedAt": "2026-05-22T11:38:12.000Z",
  "site": "https://thehackernews.com",
  "textContent": "1 Introduction\n\nThis article provides a technical analysis of how many Windows kernel mode drivers can be interacted with from user mode without the hardware they were developed for. This work was motivated by driver-oriented vulnerability research and the need to evaluate the exploitability of individual findings, which frequently affect code whose reachability is hardware-gated. The",
  "title": "Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective"
}