{"id":26121466,"url":"https://github.com/vkrebs/screen-sentinel","last_synced_at":"2025-09-04T04:37:08.983Z","repository":{"id":281535524,"uuid":"945561655","full_name":"VKrebs/screen-sentinel","owner":"VKrebs","description":"🛡️ Screen Sentinel – A personnal challenge to build a secure, tamper-resistant Windows lock screen overlay. The goal: block all interaction while keeping the desktop visible, persist as a Windows Service, enforce security restrictions, and log access attempts. 🔒","archived":false,"fork":false,"pushed_at":"2025-03-11T22:53:20.000Z","size":9,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-04-01T04:03:01.466Z","etag":null,"topics":["dotnet","experimental","hacking","hardening","lockscreen","screen-lock","security","session-management","windows-security"],"latest_commit_sha":null,"homepage":"","language":"PowerShell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/VKrebs.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-03-09T17:57:12.000Z","updated_at":"2025-03-23T07:19:53.000Z","dependencies_parsed_at":"2025-03-09T19:39:53.899Z","dependency_job_id":null,"html_url":"https://github.com/VKrebs/screen-sentinel","commit_stats":null,"previous_names":["vkrebs/screen-sentinel"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/VKrebs/screen-sentinel","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/VKrebs%2Fscreen-sentinel","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/VKrebs%2Fscreen-sentinel/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/VKrebs%2Fscreen-sentinel/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/VKrebs%2Fscreen-sentinel/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/VKrebs","download_url":"https://codeload.github.com/VKrebs/screen-sentinel/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/VKrebs%2Fscreen-sentinel/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":273552114,"owners_count":25125895,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-09-04T02:00:08.968Z","response_time":61,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["dotnet","experimental","hacking","hardening","lockscreen","screen-lock","security","session-management","windows-security"],"created_at":"2025-03-10T14:22:27.424Z","updated_at":"2025-09-04T04:37:08.700Z","avatar_url":"https://github.com/VKrebs.png","language":"PowerShell","readme":"# 🛡️ Screen Sentinel  \n\n**A personal challenge to build a tamper-resistant Windows lock screen overlay.**    \n\n---\n\n## 🔍 About  \n\n**Screen Sentinel** is an **experimental project** aimed at creating a **secure, transparent lock screen overlay** for Windows. The (unoriginal) idea is simple:  \n\n- Lock down all user interaction **while keeping the screen visible**.  \n- Persist as a **Windows Service** to prevent easy termination.  \n- **Enforce system restrictions** (disable Task Manager, prevent process launches, etc.).  \n- **Log access attempts** and system events for security tracking.  \n\nRight now, **this is a personal project**, **not a commercial-grade solution**. Expect **experimentation, work-in-progress code**, and possibly some fun security challenges along the way! 😃  \n\n---\n\n## ⚡ Features (Planned \u0026 In Progress)  \n\n🚧 **Transparent lock UI** – Block input while keeping the desktop visible.  \n🚧 **Windows Service integration** – Ensures persistence on startup.  \n🚧 **Security restrictions** – Disable Task Manager, Explorer, etc.  \n🚧 **Tamper resistance** – Prevent process termination and work around `Ctrl+Alt+Del`.  \n🚧 **Authentication methods** – Start with password, later explore EntraID, biometrics or hardware unlock.  \n🚧 **Audit logging** – Log access attempts and security events to Windows Event Log.  \n\n---\n\n## 🎯 Goals \u0026 Challenges  \n\nThis project is **more of a challenge than a product**. Some things I’m exploring:  \n\n- **Windows APIs \u0026 Security:** `CreateProcessAsUser`, privilege escalation, and system restrictions.  \n- **Process \u0026 Service Management:** How to make a persistent watchdog for a security app.  \n- **Bypass Prevention:** Understanding what users *can* and *can’t* do when trying to escape the lock.  \n- **Logging \u0026 Auditing:** How to track security events effectively.  \n\nIf you're interested in **low-level Windows hacking**, **security engineering**, or **kiosk-like system lockdowns**, this might be for you!  \n\n---\n\n## 🛠️ Setup \u0026 Running (WIP)  \n\n⚠️ **Warning:** This is an early-stage project and may break things. Use with caution.  \n\n### **Requirements**  \n- Windows 10 or 11  \n- .NET (for the service and UI)  \n\n### **Running the Project**  \n*(Steps will be added as development progresses!)*  \n\n---\n\n## 🗺️ Roadmap  \n\n🔹 **Phase 1:** Core functionality – lock UI, input blocking, simple service.  \n🔹 **Phase 2:** Process hardening – prevent termination, restrict system features.  \n🔹 **Phase 3:** Authentication methods – password, EntraID, biometrics, etc.  \n🔹 **Phase 4:** Logging \u0026 security auditing.  \n🔹 **Phase 5:** (Maybe) More advanced security enhancements.  \n\n---\n\n## 🤝 Contributions \u0026 Feedback  \n\nSince this is an **exploratory project**, I welcome **ideas, feedback, and discussions!**   \nIf you have insights on **Windows security, system lockdown techniques, or general improvements**, feel free to open an issue or share thoughts.   \n\nFor now, this is a personal project, so **contributions are informal**, but if things evolve, I may open it up more!  \n\n---\n\n## 📜 License  \n\nThis project is licensed under the **MIT License**. See the [LICENSE](LICENSE) file for details.  \n\n---\n\n## 📢 Disclaimer  \n\nThis is a **learning project**, not an enterprise security solution. **Use at your own risk** – it might have **security flaws, incomplete features, or bugs**. If you find a cool bypass, let me know! 😃  \n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fvkrebs%2Fscreen-sentinel","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fvkrebs%2Fscreen-sentinel","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fvkrebs%2Fscreen-sentinel/lists"}