A Python & C++ hybrid security tool for local system auditing and EDR telemetry simulation
Expand contents
This project explores cybersecurity centered programming and multi-language interaction capabilities by combining the ease of Python with the low-level access of C++
The goal is to simulate an EDR (endpoint detection and response) program
The tool uses a modular architecture where Python allocates memory buffers and passes pointers to the C++ binary for execution
While Python can access system info, using C++ allows for:
- Stealth: Native windows.h calls are harder to spoof than high-level wrappers
- Performance: Direct memory manipulation via pointers
- Integration: Demonstrates how to handle buffers between high-level (Python) and low-level (C++) languages
Using C++ also taught me how to interact with multiple languages in a single project
The project uses an object oriented design using an abstract base class to allow easy scalability (adding new probes)
The CLI provides feedback on the scan status
Starting Telemetry CLI
ㅤ--------------------
System Report
User name: "***"
Computer name: "***"
Debugger active: False
System status: Safe
ㅤ--------------------
Network Report
Number of scanned ports: 5
Open ports: ['None']
Closed ports: [21, 80, 443, 22, 3389]
Ports returning an error: ['None']
Network status: Safe
ㅤ--------------------
Report saved to: c:\Users\[***]\output\report.json
Log sent to (SIEM simulation): c:\Users\[***]\logs\activity.logA structured file is generated for automated processing in the output folder (SIEM simulation)
{
"time": "2025-11-30T20:41:30.296270",
"system_report": {
"user": "***",
"computer": "***",
"is_debugger_active": false,
"status": "Safe"
},
"network_report": {
"scanned_ports_count": 5,
"open": [
"None"
],
"closed": [
21,
80,
443,
22,
3389
],
"error": [
"None"
],
"status": "Safe"
}
}A new line is added to the activity log file in the logs folder
[2025-11-30T20:41:30.296270] [Safe] Scan complete, ports open:ㅤ 0, debugger:ㅤ FalseThe project is pre-compiled for Windows systems (telemetry.dll)
Simply double-click the run.bat script at the root of the repository
Clone the repository
git clone https://github.com/ahmedbda/sys-telemetry-cli.git
Navigate to source
cd sys-telemetry-cli
Run the main script
python src/python/main.py

