Skip to content

mauronz/whack_a_proc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

whack-a-proc

whack-a-proc is a tool that allows to monitor an executable and dump any PE file it loads in its own memory or injects in other processes. For more info: https://mauronz.github.io/whack-a-proc

Usage:

monitor.exe [options] *target_command_line*

Example:

monitor.exe /level 1 /all notepad.exe mytextfile.txt

Options:

  • /level [0,1,2]: Each level increases the number of APIs hooked, potentially leading to new findings, but at the cost of performances.

    • 0: Process and thread manipulation. Hooked APIs: NtCreateThread, NtCreateThreadEx, NtResumeThread, NtCreateUserProcess
    • 1: Making memory executable. Hooked APIs: NtProtectVirtualMemory
    • 2: Library loading. Hooked APIs: LoadLibraryA, LoadLibraryW
  • /protect: Set a hook on ZwMapViewOfSection to prevent a remapping of ntdll.dll. If ntdll.dll is being mapped, the output pointer to the mapped section (BaseAddress) is replaced with the currently mapped ntdll.dll (that is hooked).

  • /all: Inject into newly created processes without asking for confirmation.

  • /verbose: Print logs.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Packages

No packages published