Loading...
Discovering amazing open source projects
Discovering amazing open source projects
Loading post content...
OpenArk is a free, single‑binary Windows utility that helps reverse engineers, developers, and security analysts uncover hidden malware and inspect low‑level OS internals. No dependencies, full source transparency, and a growing suite of kernel and user‑mode tools make it a compelling alternative to costly proprietary anti‑rootkit solutions.
Modern Windows environments are a battlefield of sophisticated malware that can hide deep inside the kernel, hijack system callbacks, or masquerade as legitimate processes. Traditional antivirus products often miss these stealthy components, leaving analysts and developers scrambling for a reliable way to expose, dissect, and neutralize them.
Enter OpenArk – an open‑source, single‑executable anti‑rootkit framework that gives you direct visibility into the OS kernel, processes, memory, drivers, and more. Whether you’re a reverse‑engineer hunting a persistent threat, a developer needing a low‑level debugging aid, or a security team looking for a cost‑free, auditable tool, OpenArk puts powerful investigative capabilities at your fingertips without vendor lock‑in.
OpenArk.exe
works on 32‑ and 64‑bit Windows (XP through 11) without installing runtimes or libraries.Category | Feature | What It Does |
---|---|---|
Process Management | Process/Thread/Module/Handles view | Real‑time enumeration of all processes, their threads, loaded modules, open handles, and associated tokens. |
Memory Tools | Memory Scan, PPL support, Dump | Search for suspicious patterns, read/write protected memory, and extract full memory dumps for offline analysis. |
Kernel Toolkit | Drivers, Callbacks, Filters, IDT/SDT, NDIS/WFP | Inspect kernel objects, view registered callbacks (e.g., file system, registry), and manipulate network filters. |
Injection Engine | x86/x64 DLL injector | Inject user‑mode DLLs into target processes for debugging or payload delivery. |
Scanner | PE/ELF parser, future virus analysis | Browse import/export tables, relocation entries, and prepare for automated malware signature generation. |
Bundler | Directory → single executable, script support | Package tools, scripts, or data into a portable binary, simplifying distribution and execution on air‑gapped systems. |
CoderKit | Text encoding viewer, LastError/NTSTATUS lookup | Quickly translate error codes, view Unicode/ANSI encodings, and decode timestamps. |
Console | Built‑in command prompt with custom commands | Execute built‑in utilities or run your own PowerShell/Batch snippets from within OpenArk. |
Multilingual UI | English & Chinese (more languages planned) | Accessible interface for a global community of analysts. |
OpenArk ships as a single executable. Grab the latest release from the GitHub releases page or the official website.
# Example using PowerShell to download the latest release (replace URL with actual asset link)
Invoke-WebRequest -Uri "https://github.com/BlackINT3/OpenArk/releases/latest/download/OpenArk.exe" -OutFile "OpenArk.exe"
Many kernel‑level features require elevated rights. Right‑click OpenArk.exe
→ Run as administrator.
When the UI launches, press Ctrl+~ to open the console. Try a few starter commands:
# List all processes with PID, name, and token info
ps
# Dump memory of a specific process (replace 1234 with the PID)
memdump -p 1234 -o dump.bin
# Inject a DLL into a process
inject -p 1234 -d C:\path\to\my.dll
If you want to extend OpenArk or compile a custom kernel driver, follow these steps:
git clone https://github.com/BlackINT3/OpenArk.git
cd OpenArk
# Open the solution in Visual Studio 2022 (requires the Windows Driver Kit)
# Build the `UNONE` (user‑mode) and `KNONE` (kernel‑mode) projects
Tip: The repository includes a
Manuals
folder with detailed build instructions and API references. See the full documentation at https://openark.blackint3.com/manuals/.
Feature | OpenArk (Free) | Malwarebytes Anti‑Rootkit | GMER | Microsoft Defender (Advanced Threat Protection) |
---|---|---|---|---|
Cost | $0 (open source) | $39.99 (per device) | $0 (shareware) | Included with Windows 10/11 (enterprise tier may require licensing) |
Kernel Access | Full driver‑level toolkit (callbacks, IDT, filters) | Limited kernel inspection | Kernel callbacks, but no driver manipulation | Limited to built‑in heuristics, no direct driver access |
Single‑binary, no deps | ✔️ | ✖️ (installer) | ✔️ (portable) | ✖️ (requires OS integration) |
Extensibility | Source code, CoderKit, Bundler, custom scripts | Closed source, no plugins | Closed source | Closed source, limited API |
Multi‑language UI | English, Chinese (expandable) | English only | English only | English only |
Community Support | GitHub issues, Discord, QQ groups | Commercial support | Community forums | Microsoft support (enterprise) |
Platform Coverage | Windows XP‑11 (32/64‑bit) | Windows 7‑11 (64‑bit) | Windows 7‑11 (64‑bit) | Windows 10‑11 (64‑bit) |
Privacy | No telemetry, all data stays local | Optional telemetry | No telemetry | Telemetry enabled by default |
OpenArk delivers comparable (and often deeper) kernel visibility without the licensing fees, telemetry concerns, or vendor lock‑in that come with commercial products.
OpenArk is ready to empower security professionals, reverse engineers, and developers who refuse to rely on black‑box solutions. Dive in, explore the toolkit, and contribute back to the community.
Join the conversation on Discord (https://discord.com/invite/w9A8q9naDY) or one of the QQ groups listed on the site, and help shape the next generation of open‑source anti‑rootkit technology.
Curating the best open source projects every day. Follow us for daily discoveries of amazing tools and libraries.
Get all the latest posts delivered straight to your inbox.
We respect your privacy. Unsubscribe at any time.