USTA_DLL is a Windows x64 DLL that hooks native system calls (ntdll.dll) to trace and log key userland API calls. It's designed for malware analysis, red team tooling, and behavioral monitoring.
- Inline hooking of native syscalls:
NtOpenProcessNtCreateThreadExNtWriteVirtualMemoryNtReadVirtualMemoryNtAllocateVirtualMemoryNtMapViewOfSection
- Logs events in JSON format
- Supports stdout or file-based logging
- Easy to inject into any target process (e.g., using Extreme Injector)
- Compile the project as a
x64 DLL(Debug or Release) - Inject
USTA_DLL.dllinto a target process (e.g.,mimikatz.exe) - View logs in:
- Console (stdout)
- Log file (e.g.,
C:\Temp\usta_hooks.log) - Or attach DebugView for OutputDebugString monitoring
USTA\_DLL/
โโโ dllmain.cpp
โโโ HookManager.cpp/.h
โโโ Syscalls.cpp/.h
โโโ Logger.cpp/.h
โโโ pch.h / pch.cpp
This project is for educational and research purposes only. Use it responsibly.
MIT License