Getting to ring0 is the final step towards complete system compromise and can also be the most fun. In the course of one year, we have found around twenty kernel vulnerabilities, mostly in Windows and Linux, some of them being uncovered after ten or fifteen years of existence. We share some of this work and demonstrate some exploits, bugs and techniques.