A forum for reverse engineering, OS internals and malware analysis 

Forum for announcements and questions about tools and software.
 #1760  by Libertad
 Wed Aug 04, 2010 6:39 pm
Tuluka is a new powerful AntiRootkit, which has the following features:

-Detects hidden processes, drivers and devices
-Detects IRP hooks
-Identifies the substitution of certain fields in DRIVER_OBJECT structure
-Checks driver signatures
-Detects and restores SSDT hooks
-Detects suspicious descriptors in GDT
-IDT hook detection
-SYSENTER hook detection
-Displays list of system threads and allows you to suspend them
-IAT and Inline hook detection
-Shows the actual values of the debug registers, even if reading these registers is controlled by someone
-Allows you to find the system module by the address within this module
-Allows you to display contents of kernel memory and save it to disk
-Allows you to dump kernel drivers and main modules of all processes
-Allows you to terminate any process
-Is able to dissasemble interrupt and IRP handlers, system services, start routines of system threads and many more
-Allows to build the stack for selected device
-Much more..

http://tuluka.justfree.com
http://depositfiles.com/files/mrv3mx3ru

MD5: c1681611dabbc8543fd52bd5213c5329 (exe file)
SHA-1: 7a4010b8d227ef58124d1bb6a74eaef0d55feb0d (exe file)
 #1801  by Alex
 Thu Aug 05, 2010 10:34 am
I've just tested Tuluka kernel inspector with few old demo rootkits (RKDemo 1.1, RKDemo 1.2 and phide_ex) and with TDL3.

RKDemo 1.1
process - not detected
driver - not detected

RKDemo 1.2
process - not detected
driver - not detected

phide_ex
process - not detected
driver - not detected

TDL3
Image

Image

Alex