Skip to content

TerryAckee/SysWrite-Interceptor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 

Repository files navigation

SysWrite-Interceptor

This is script guards your driverware by hooking into low level systems and auditing write operations for added protection at device system layers behind network level. Kernel-Write-Interceptor (GlobalStuffOn) Active System Integrity & Output Masking 🛡️ Project Overview Kernel-Write-Interceptor is a specialized security utility designed to act as an intermediary layer between low-level system operations and the user-facing interface (CLI/Logs). By auditing kernel write events before they reach the terminal or system records, this script provides a robust defense mechanism against unauthorized observation and system tampering.

🚀 Key Features Response Auditing: Intercepts system operation signals at the kernel level before they are committed to logs or displayed to the user. demo

Note:! The script does not add noise blur or distort the responses written and displayed by your system terminal, I edited that image for security purposes. Active Data Obfuscation: Transform sensitive write procedures into randomized, multi-byte character strings (e.g., Japanese glyphs and symbols). This masks the true nature of the operation from unauthorized observers.

Interface Decoupling: Creates a "communication buffer" between device driver layers and the Command Line Interface (CLI). Intruder Deterrence: Designed to confuse and alert. When an intruder sees obfuscated output, it signals that the system is under active protection, effectively discouraging further infiltration attempts Language: [Insert Language, e.g., PowerShell / Python / C++]

🚀 Deployment & Persistence This script is designed to run silently in the background and persist across system reboots. Follow the instructions below based on your requirements.

  1. Running in the Background To start the script and keep it running after you close your terminal session, use nohup:

Bash

nohup python3 your_script.py & Logs: Output will be saved to nohup.out by default.

To Stop: Find the process ID using ps aux | grep your_script.py and use kill [PID].

  1. Auto-Start on Boot (Persistence) To ensure the intercept script starts automatically when the system boots, the easiest method is using crontab.

Open the crontab editor:

Bash

crontab -e Add the following line at the bottom of the file:

Bash

@reboot /usr/bin/python3 /path/to/your/project/your_script.py & Save and exit.

  1. Running as a System Service (Recommended) For production-grade reliability on Linux (Ubuntu/Debian/CentOS), create a systemd service:

Create the service file:

Bash

sudo nano /etc/systemd/system/intercept-script.service Paste the following configuration:

Ini, TOML

[Unit] Description=Intercept Script Background Service After=network.target

[Service] ExecStart=/usr/bin/python3 /path/to/your_script.py WorkingDirectory=/path/to/project/folder Restart=always User=your-username

[Install] WantedBy=multi-user.target Enable and start the service:

Bash

sudo systemctl enable intercept-script sudo systemctl start intercept-script Note: Ensure the script has executable permissions (chmod +x your_script.py) and that any environment variables or paths are absolute.intended for educational and security research purposes. Always ensure you have explicit permission before deploying system-level monitoring or obfuscation tools on a network.

About

Operating System SHell access procedure with an Emedded GIF displaying the finished product of my deployment CLI software defense script. I inserted Japanese characters into a CLI protection software using real library commands that add the language into the systems character library adding an extra security layer to the harddrive system defenses

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages