Step by step exploitation for the Code Injection vulnerability that I found.
Deep dive into a modern stealth Linux kernel rootkit with advanced evasion and persistence techniques