{"id":24289084,"url":"https://github.com/keowu/instrumentationcallbacktoolkit","last_synced_at":"2025-03-06T01:21:41.182Z","repository":{"id":195266632,"uuid":"692585197","full_name":"keowu/InstrumentationCallbackToolKit","owner":"keowu","description":"A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using InstrumentationCallback.","archived":false,"fork":false,"pushed_at":"2023-09-23T03:24:33.000Z","size":137,"stargazers_count":25,"open_issues_count":0,"forks_count":9,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-01-16T10:58:15.783Z","etag":null,"topics":["anticheat","instrumentation","malware","nirvana","ntoskrnl","reverse-engineering","syscall","windows"],"latest_commit_sha":null,"homepage":"","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/keowu.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2023-09-16T23:57:30.000Z","updated_at":"2024-12-23T06:49:51.000Z","dependencies_parsed_at":"2023-09-17T07:58:13.225Z","dependency_job_id":"816c2335-1776-4885-9aa1-333579528d1e","html_url":"https://github.com/keowu/InstrumentationCallbackToolKit","commit_stats":null,"previous_names":["keowu/instrumentationcallbacktoolkit"],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/keowu%2FInstrumentationCallbackToolKit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/keowu%2FInstrumentationCallbackToolKit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/keowu%2FInstrumentationCallbackToolKit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/keowu%2FInstrumentationCallbackToolKit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/keowu","download_url":"https://codeload.github.com/keowu/InstrumentationCallbackToolKit/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":242128900,"owners_count":20076275,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["anticheat","instrumentation","malware","nirvana","ntoskrnl","reverse-engineering","syscall","windows"],"created_at":"2025-01-16T10:51:18.064Z","updated_at":"2025-03-06T01:21:41.158Z","avatar_url":"https://github.com/keowu.png","language":"C++","readme":"# Instrumentation Callback ToolKit\n \n \u003cp\u003e A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using InstrumentationCallback. \u003c/p\u003e\n\n\n[\u003cimg src=\"https://img.youtube.com/vi/LHb-fx-fKCA/hqdefault.jpg\" width=\"600\" height=\"300\"/\u003e](https://www.youtube.com/embed/LHb-fx-fKCA)\n\n##### The project is divided into two parts:\n\nSmellsLikeKernelSpirit - It is responsible for installing an instrumentation callback in the target process through DLL injection (usually from the currently running main thread).\n\nDetectProcessContainerNirvaned - It is responsible for detecting a process container with an instrumentation callback installed in any operating system process.\n\n#### Using DetectProcessContainerInstrumented:\n\nYou can compile and use it in your heuristics to detect whether your user-land process or which user-land processes are using the resource.\n\n\u003cp align=\"center\"\u003e\n \u003cimg src=\"images/DetectProcessContainerInstrumented.png\" /\u003e\n\u003c/p\u003e\n\n#### Using SmellsLikeKernelSpirit(x86 and x64):\n\nYou can download precompiled binaries and their respective debug files from the 'release' tab of this repository to avoid the need for compilation (and directly intercept).\n\nWhen injecting, a console will be allocated for the process and will capture any of the system calls used by it.\n\nExemple:\n\n\u003cp align=\"center\"\u003e\n \u003cimg src=\"images/SmellsLikeKernelSpirit.png\" /\u003e\n\u003c/p\u003e\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fkeowu%2Finstrumentationcallbacktoolkit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fkeowu%2Finstrumentationcallbacktoolkit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fkeowu%2Finstrumentationcallbacktoolkit/lists"}