int0 / ProcessIsolator

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

ProcessIsolator

Utility to hook SSDT of specific process and transfer control to a service (usermode app) for handling to determine action allow/deny API call etc. currenly only NTAPI/WIN32K logging is supposeted no handlers were implemented. Ideally this should use virtualization to hook LSTAR CSTAR MSRs and don't implement own KiSystemCall.

Requirements:

Usage

  • Compile
  • Install driver and run svc in VM
  • Drop target EXE binary in SystemDrive:\PISO
  • Enjoy logged APIs

Why

  • You might want to use this to sandbox malware and collect behavioural info easy to implement because all handlers are in user-mode.
  • Study code and learn kernel programming on Windows

Example

Process Explorer is running under Process Isolator GitHub Logo

About

License:MIT License


Languages

Language:C++ 57.7%Language:C 39.5%Language:Assembly 2.7%Language:Batchfile 0.1%