This project is a fun and educational experiment to dive deep into malware development by understanding how the Windows kernel and Endpoint Detection and Response (EDR) mechanisms work.
It monitors process creation and termination, sending details to a user-mode application through a named pipe.
- ✅ Monitors process creation and termination
- ✅ Retrieves process image name, parent process, command line, and session ID
- ✅ Sends data to a user-mode application via a named pipe
- ✅ Built for learning and research purposes
- ✅ Helps understand kernel development and EDR mechanisms
- Kernel Driver 🖥️: Hooks into process creation and termination events.
- User-mode Application 📡: Reads process activity data from the named pipe.
To build the project yourself, you will need:
- Windows Driver Kit (WDK)
- Visual Studio 2022 with the WDK extension installed
- Open Visual Studio 2022.
- Load the project and set the WDK environment.
- Build the driver (.sys) and the user-mode application (.exe).
Alternatively, you can download the pre-built binaries from the Releases section.
You can load the driver using one of the following methods:
- Download OSR Driver Loader from OSR Online.
- Select the compiled
.sys
file. - Load the driver and start monitoring process activity.
- Open Command Prompt (Administrator).
- Run the following commands:
sc create MiniEDR type= kernel binPath= C:\Path\To\Driver.sys
sc start MiniEDR
Agent.exe