Code: __ __ _____ _ _ | \/ | | __ \ | | | | | \ / | ___ _ __ ___ | |__) | __ ___ | |_ ___ ___| |_ | |\/| |/ _ \ '_ ` _ \| ___/ '__/ _ \| __/ _ \/ __| __| | | | | __/ | | | | | | | | | (_) | || __/ (__| |_ |_| |_|\___|_| |_| |_|_| |_| \___/ \__\___|\___|\__| Spoiler: readme.txt The purpose of this thread is quite simply a playground for MemProtect. Users can provide support for each other and share rule sets within code tags. Some users have suggested to split off the MemProtect discussion from the main Bouncer thread to keep information more concise. I was hesitating for some weeks prior to creating this MemProtect support and discussion thread because I wanted to ensure that MemProtect had a solid future. The developer, Florian, has now confirmed to me that it will receive stable build status along with cross-signing, documentation, and all of that good stuff. MemProtect has proven itself stable, however, the developer does not believe in promoting to stable status until he has completed appropriate documentation. Put simply; MemProtect is a process memory sandbox with zero overhead. This kernel-mode driver utilizes Microsoft Windows built-in Protected Processes feature and essentially allows the user to configure protected processes with any executable, from any directory. It is a security feature that is typically reserved only for some critical Windows processes, but this driver opens up the possibilities to use protected processes however the user/admin chooses; limited only by one's imagination and creativity. The following are a list of access rights which are removed by MemProtect: Source link: https://msdn.microsoft.com/en-ca/library/windows/desktop/ms684880(v=vs.85).aspx Anyway, I just wanted to get the discussion and support started with this new thread for MemProtect specifically and allow the community to collaborate here. There are some other Microsoft technical documentation links on protected processes which I have forgotten at the moment, so I will update this post accordingly when I come across the relevant informative source links. Download: http://beta.excubits.com/ Have fun!