Usually, Pumpernickel + MZwritescanner, and even MemProtect (default allow) have not much to do. But, Bouncer (default deny) checks many DLLs, and as we know from NVT SOB and SRP with DLL checking, this can slow down the system.
Generally, Florian takes quite a bit of pride and pays more attention (more than I would expect) with regard to performance, efficiency, and also taking into consideration the cleanliness and organization structure to his kernel-level coding within the drivers' code base. He seems to always be finding ways to refine those details and obsesses over a tidy code base and proper coding structure.
That being said, the one and only aspect which would have somewhat of a performance hit is when (if) any of the drivers are utilizing the SHA256 hashing. For example, if you manually disable SHA256 on Bouncer (and I believe MZWriteScanner as well) there is quite literally zero performance penalties.
However, depending on what
@Windows_Security and Florian and planning here, SHA256 may have some importance for certain aspects of protection.
Lately I have been using just MemProtect on it's own, utilizing it's recently built-in DLL Module filtering as a significant layer of protection with regard to specific application whitelisting bypasses as well as things such as LSASS.exe protection and much more. That MemProtect driver alone is powerful beyond words.
Last night I took the time to read though every single post here throughout these 6 pages in this thread. I am absolutely thrilled and excited to see these ideas come to fruition. Florian is a hard code, low level, kernel programmer. He's obviously not proficient with regard to GUI development. However, I have always dreamed and imagined what can be possible with combining all of Excubits' drivers into one security program. That would be nearly unstoppable. Think of it as multi-layered Matrix-like
(Matrix-Jail-like) protection that attackers would gets caught within any of the stages of protection mechanisms. Possibly it could be called something such as
Kernel-Matrix, Matrix-JAIL, Kernel-JAIL, SpiderWeb-JAIL, etc. I am not very good with names.
Kernel-Matrix Security - a highly efficient, sophisticated, low-level, multi-layered JAIL architecture for the Windows kernel...
Anyway, I am more than happy to donate my time for creating and testing some pretty intricate rule sets. It's been something like 6-months to a year since I last logged in here at MalwareTips, so it will take me some time to get caught up. My biggest struggle here at MalwareTips has been getting familiar with all of the many categories and sub-threads and so on. But I will put some effort into familiarizing myself here more at MT and possibly less so at Wilders.