Skip to content

Latest commit

 

History

History
23 lines (17 loc) · 975 Bytes

README.md

File metadata and controls

23 lines (17 loc) · 975 Bytes

ProcessIsolator

Utility to hook SSDT of specific process and transfer control to a service (usermode app) for handling to determine action allow/deny API call etc. currenly only NTAPI/WIN32K logging is supposeted no handlers were implemented. Ideally this should use virtualization to hook LSTAR CSTAR MSRs and don't implement own KiSystemCall.

Requirements:

Usage

  • Compile
  • Install driver and run svc in VM
  • Drop target EXE binary in SystemDrive:\PISO
  • Enjoy logged APIs

Why

  • You might want to use this to sandbox malware and collect behavioural info easy to implement because all handlers are in user-mode.
  • Study code and learn kernel programming on Windows

Example

Process Explorer is running under Process Isolator GitHub Logo