There is going to be a ton of great content in the presentation, but there are a few parts the audience can get excited for. First off, for any audience member who hasn't used kernel-level malware in the past, I'll explain several methods of loading a rootkit, arguably one of the more difficult steps in making one. Furthermore, I'll be walking the audience through the creation and design decisions of the "Spectre Rootkit", which abuses legitimate network communication to communicate with its C2. Along with the presentation of the talk, I will be open sourcing this rootkit to the public as a learning resource.