vmcall / tasklist-brutus

Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

tasklist-brutus

Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation

Example output

4 - <empty>
76 - \Device\HarddiskVolume4\Windows\System32\svchost.exe
380 - \Device\HarddiskVolume4\Windows\System32\smss.exe
416 - \Device\HarddiskVolume4\Program Files (x86)\Google\Chrome\Application\chrome.exe
560 - \Device\HarddiskVolume4\Windows\System32\dwm.exe
564 - \Device\HarddiskVolume4\Program Files\NVIDIA Corporation\ShadowPlay\nvsphelper64.exe
588 - \Device\HarddiskVolume4\Windows\System32\csrss.exe
668 - \Device\HarddiskVolume4\Windows\System32\smss.exe
672 - \Device\HarddiskVolume4\Windows\System32\svchost.exe
676 - \Device\HarddiskVolume4\Windows\System32\wininit.exe
684 - \Device\HarddiskVolume4\Windows\System32\csrss.exe
760 - \Device\HarddiskVolume4\Windows\System32\winlogon.exe
812 - \Device\HarddiskVolume4\Windows\System32\services.exe```

About

Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation

License:GNU General Public License v3.0


Languages

Language:C++ 100.0%