Skip to content

PoC of obtaining the _EPROCESS address of any cmd/pwsh in user mode.

Notifications You must be signed in to change notification settings

hasbiyama/cmdEPROC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

cmdEPROC

This project demonstrates a Proof of Concept (PoC) for obtaining the _EPROCESS address of any cmd and/or PowerShell in usermode by utilizing their respective conhost (or openconsole.exe in Windows 11).

Please refer to these three series to get more info about the development process of this project:

[1] Getting the _EPROCESS Address of ANY cmd/pwsh process in Ring 3 (1)
[2] Getting the _EPROCESS Address of ANY cmd/pwsh process in Ring 3 (2)
[3] Getting the _EPROCESS Address of ANY cmd/pwsh process in Ring 3 (3)

[+] Tested on Windows 7, 8, 10, and 11.

CMD

Screenshot 2024-07-15 231810

PWSH

Screenshot 2024-07-15 234843

Disclaimer

This project is intended for educational and research purposes only. Usage of tools like cmdEPROC in any unauthorized or malicious activities is strictly prohibited. The developers are not responsible for any misuse or damage caused by the misuse of this software.

About

PoC of obtaining the _EPROCESS address of any cmd/pwsh in user mode.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages