Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit 236a59c

Browse files
+ readme
1 parent 36c7918 commit 236a59c

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

‎README.md‎

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
# kptnhook
2+
3+
## TL;DL
4+
Kptnhooks aim is to assist in global api hooking for security research and reverse engineering.
5+
I'm using a kernel driver to ensure each and every process is accessible, from the first processes started by windows before even the login screen. Certain security mitigations have to be disabled from the kernel side for this to work, as some windows processes have special protections against hooking and injection.
6+
7+
## Status
8+
This is still highly WIP. The kerneldriver is correctly injecting into 32 and 64bit processes without crashing any of them but the dll is not doing anything yet. Here is my TODO list:
9+
- [ ] injected dll should provide hooks and allow sideloading of user-provided dlls
10+
- [ ] disable PPL to allow loading of user-provided dlls
11+
- [ ] provide prebuild binaries
12+
- [ ] provide install/uninstall scripts that disable driver signature enforcement and trust the test certificate
13+
- [ ] instructions / guide and whitepaper

0 commit comments

Comments
(0)

AltStyle によって変換されたページ (->オリジナル) /