Kernel Detective v1.4.1

seeders: 1
leechers: 0
Added on April 6, 2015 by bedmed400in Applications > Windows
Torrent verified.



Kernel Detective v1.4.1 (Size: 2.74 MB)
 dbghelp.dll1.16 MB
 Kernel Detective.exe832.5 KB
 Readme.txt3.44 KB
 dbgview.bat39 bytes
 SCSI.kds2.59 KB
 hxdmp.kds1.78 KB
 diskio.kds948 bytes
 Persist.h8.8 KB
 utils.h3.15 KB
 refs.h2.88 KB
 profile.h2.67 KB
 Trace.h2.38 KB
 GDK.h48 bytes
 self.imp11.21 KB
 list6.29 KB
 listx6.17 KB
 list.new6.13 KB
 IOSTREAM6.08 KB
 map5.79 KB
 old-string5.74 KB
 algorithm5.05 KB
 TURTLE.h4.64 KB
 WININET.h3.41 KB
 RX.dll68 KB
 string_imp.dll32 KB
 RX.lib2.96 KB
 EXTRACT.awk249 bytes
 ucc12.dll460 KB
 Script ext.txt6.92 KB
 KeDetective.h5.5 KB
 kscript.kdp90 KB
 NULL.rar4.45 KB


Description

Kernel Detective

is a free tool that help you detect, analyze, manually modify and fix some Windows NT kernel modifications. Kernel Detective gives you the access to the kernel directly so it's not oriented for newbies. Changing essential kernel-mode objects without enough knowledge will lead you to only one result ... BSoD !


Supported NT versions :
XP/Vista/Server 2008/SEVEN/Win 8 +


Kernel Detective gives you the ability to :

1- Detect Hidden Processes.
3- Detect Hidden Threads.
2- Detect Hidden DLLs.
3- Detect Hidden Handles.
4- Detect Hidden Driver.
5- Detect Hooked SSDT.
6- Detect Hooked Shadow SSDT.
7- Detect Hooked IDT.
8- Detect Kernel-mode code modifications and hooks.
9- Disassemble (Read/Write) Kernel-mode/User-mode memory.
10- Monitor debug output on your system.


Enumerate running processes and print important values like Process Id, Parent Process Id, ImageBase, EntryPoint, VirtualSize, PEB block address and EPROCESS block address. Special undocumented detection algorithms were implemented to detect hidden processes.

Detect hidden and suspicious threads in system and allow user to forcely terminate them .

Enumerate a specific running process Dynamic-Link Libraries and show every Dll ImageBase, EntryPoint, Size and Path. You can also inject or free specific module.

Enumerate a specific running process opened handles, show every handle's object name and address and give you the ability to close the handle.

Enumerate loaded kernel-mode drivers and show every driver ImageBase, EntryPoint, Size, Name and Path. Undocumented detection algorithms were implemented to detect hidden drivers.

Scan the system service table (SSDT) and show every service function address and the real function address, detection algorithm improved to bypass KeServiceDescriptorTable EAT/IAT hooks.You can restore single service function address or restore the whole table.

Scan the shadow system service table (Shadow SSDT) and show every shadow service function address and the real function address. You can restore single shadow service function address or restore the whole table

Scan the interrupts table (IDT) and show every interrupt handler offset, selector, type, Attributes and real handler offset. This is applied to every processor in a multi-processors machines.

Scan the important system kernel modules, detect the modifications in it's body and analyze it. For now it can detect and restore inline code modifications, EAT and IAT hooks. I'm looking for more other types of hooks next releases of Kernel Detective.

A nice disassembler rely on OllyDbg disasm engine, thanks Oleh Yuschuk for publishing your nice disasm engine .With it you can disassemble, assemble and hex edit virtual memory of a specific process or even the kernel space memory.

Kernel Detective use it's own Read/Write routines from kernel-mode and doesn't rely on any windows API. That make Kernel Detective able to R/W processes VM even if NtReadProcessMemory/NtWriteProcessMemory is hooked, also bypass the hooks on other kernel-mode important routines like KeStackAttachProcess and KeAttachProcess.






Sharing Widget


Download torrent
2.74 MB
seeders:1
leechers:0
Kernel Detective v1.4.1