Need help with TelemetrySourcerer?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

400 Stars 71 Forks Apache License 2.0 43 Commits 0 Opened issues


Enumerate and disable common sources of telemetry used by AV/EDR.

Services available


Need anything else?

Contributors list

# 140,242
38 commits

Telemetry Sourcerer


Telemetry Sourcerer can enumerate and disable common sources of telemetry used by AV/EDR on Windows.

Red teamers and security enthusiasts can use this tool in a lab environment to:

  • Identify collection-based blind spots in the products they're up against.
  • Determine which sources of telemetry generate particular types of events.
  • Validate whether using the tool's tampering capabilities can lead to detection.

For details on building a private lab, consider reading my post on Diverting EDR Telemetry to Private Infrastructure.

OPSEC WARNING: Although it's possible to use this in targeted environments, there are OPSEC risks when using any offensive security tool as is. You can instead leverage the code from this project into your own tooling for operational use and combine with other techniques to reduce the footprint it creates.


  • Enumerates various kernel-mode callbacks with the ability to suppress them.
  • Detects inline user-mode hooks within the process, with the ability to unhook them.
  • Lists ETW sessions and providers while highlighting potentially relevant ones to disable.


Usage Instructions

  1. Download the latest release.
  2. Extract files.
  3. Launch the executable (run elevated for kernel-mode callbacks or more ETW sessions).

Kernel-mode Callbacks

To view kernel-mode callbacks, the tool needs to be run with elevated privileges to load a driver. The driver does not come signed, so consider enabling test signing mode, temporarily disabling driver signature enforcement (DSE), or signing the driver with a valid certificate:

Test Signing Mode

  1. Disable BitLocker and Secure Boot.
  2. Open an elevated Command Prompt window.
  3. Enter
    bcdedit.exe -set TESTSIGNING ON
  4. Reboot system.
  5. Launch Telemetry Sourcerer with elevated privileges.

Disable DSE with KDU

  1. git clone
  2. Open an elevated Command Prompt window.
  3. Enter
    kdu -dse 0
    to disable DSE.
  4. Launch Telemetry Sourcerer with elevated privileges.
  5. Enter
    kdu -dse 6
    to enable DSE.

This option may be incompatible with KPP on Windows 8.1+.

Sign Driver

  1. Get SignTool from the Windows SDK and an appropriate cross-certificate from Microsoft Docs.
  2. signtool sign /a /ac "cross-cert.cer" /f "cert.pfx" /p "password" TelemetrySourcererDriver.sys
  3. Launch Telemetry Sourcerer with elevated privileges.

Caveats and Limitations

  • This tool is meant for research purposes only and is not OPSEC-safe for production use.
  • Compiled with Visual Studio 2019 using the Windows 10 SDK (10.0.19041.0) and WDK (2004).
  • Currently does not look for IAT/EAT user-mode hooks, or kernel-mode hooks.
  • The driver has not been thoroughly tested for abuse cases.
  • Tested on Windows 7 and 10 (x64) only.


This tool was developed by @Jackson_T but builds upon the work of others:

Related Articles and Projects


This project is licensed under the Apache License 2.0.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.