Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Assessment-> Root Kits » driverless_eprocess_list

This Directory TOP
Hacker Defender V1.0.0
migbot
suckit2priv.tar.gz
Morphine V2.7
AFX Rootkit 2005
HideToolz v2.1
NtIllusion V1.0
enyelkm-1.3-no-objs
phalanx-b6.tar
SInAR-0.3.tar
ssheater-1.1.tar.gz
pingrootkit.tar
m0rtix.c
CheatEngine
NIAP Anti Rootkit Tools
Aryan Rat
override.tar.bz
BH-Rootkit-NT 0.1
backd00r.c
logginsh.txt
silentdoor.tar.gz
HE4Hook V215b6
httpbd.pl.txt
WINLOGON Hijack v0.3
InstDvr
Windows Memory Forensic Toolkit
basic_hook_hide_proc
Logoner V0.0.2
r57-pid-check.txt
aircrackGui
StuxnetRemover 1.0.1.3
NT Rootkit V0.4.4
Search

driverless_eprocess_list

File Size: 94KB
Developer:
Description:     This program is a modified version of winkps from "Playing with Windows /dev/(k)mem". The article basically shows how to go ring0 with out drivers. My version should run on windows XP and win2k without modification. If there is an exception when ran, keep re-executing the program until it lists some processes. Sometimes the callgate isnt always installed, sometimes it doesnt walk through the whole eprocess chain, but it does eventually.:) I dont know why this is. crazylord gives an in-depth explanation of the code. However,its based on the win2k eprocess offsets which are different than xp. Some kernel variables and routines are hardcoded for win2k in his article. The only thing hardcoded in winepl.c is the offset to the activeprocesslinks in the eprocess structure. Those offsets for nt,win2k,xp havent changed yet so its fine. Hopefully, someone can find a memmory scan algorithm to find the activeprocesslink offset for future changes to the eprocess structure. ~Blacksoulman
Download:   driverless_eprocess_list

 

Sponsor Links

Sponsor Links

Share/Bookmark