Skip to content

int0/ProcessIsolator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ProcessIsolator

Utility to hook SSDT of specific process and transfer control to a service (usermode app) for handling to determine action allow/deny API call etc. currenly only NTAPI/WIN32K logging is supposeted no handlers were implemented. Ideally this should use virtualization to hook LSTAR CSTAR MSRs and don't implement own KiSystemCall.

Requirements:

Usage

  • Compile
  • Install driver and run svc in VM
  • Drop target EXE binary in SystemDrive:\PISO
  • Enjoy logged APIs

Why

  • You might want to use this to sandbox malware and collect behavioural info easy to implement because all handlers are in user-mode.
  • Study code and learn kernel programming on Windows

Example

Process Explorer is running under Process Isolator GitHub Logo

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published