-
Updated
May 14, 2022 - C
#
memory-scanning
Here are 17 public repositories matching this topic...
memory scanner for Linux
A series of programs demonstrating the basics of Memory Scanning, Api Hooking and DLL Injection. The high point is using Notepad.exe as a render target, and playing snake in a notepad window
-
Updated
May 23, 2020 - C++
PoC memory injection detection agent based on ETW, for offensive and defensive research purposes
-
Updated
Apr 10, 2021 - C
A collection of C++11 headers useful for reverse engineering
cplusplus
cpp
memory
reverse-engineering
pointer
rtti
boyermoore
cplusplus-11
memory-scanning
memory-scanner
boyer-moore
boyer-moore-algorithm
aob
boyer-moore-horspool
-
Updated
May 19, 2022 - C++
ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
etw
memory-scanning
blueteam
memory-scanner
realtime-monitoring
remote-thread-injection
processmonitoring
meterpreter-detection
tcpip-monitoring
thread-monitor
imageloads
malicious-traffic-detection
detection-etw-events
virtualmemallocation-detection
memory-scanner-by-etw-events
threat-hunting-via-etw
threat-hunting-via-sysmon
cobaltstrike-detection
payload-detection
technique-detection
-
Updated
May 30, 2022 - C#
Linux alternative game memory editor
-
Updated
Jun 19, 2022 - C++
Code Injection technique written in cpp language
-
Updated
Jan 5, 2018 - C++
-
Updated
Jun 17, 2022 - C++
A packet logger for the MMORPG NosTale.
-
Updated
Apr 12, 2022 - C++
-
Updated
Sep 7, 2019 - C
Feature-rich C99 library for memory scanning purposes, designed for Windows running machines, meant to work on both 32-bit and 64-bit portable executables. Has a modern C++ wrapper.
-
Updated
Dec 30, 2021 - C
Scan ranges of memory for byte patterns. 8B 0D ? ? ? ?
-
Updated
Jun 20, 2022 - C++
An experimental jit-compiled pattern scanner
-
Updated
Nov 22, 2018 - C++
resilar
commented
Feb 19, 2019
Warning should be shown if attaching to target process fails and kernel.yama.ptrace_scope is non-zero. Suggested fixes are echo 0 | sudo tee /proc/sys/kernel/yama/ptrace_scope
and running ramfuck as root. The latter is obviously not recommended.
Open
Documentation
A sample solution around obfuscating sensitive data in process memory.
-
Updated
Mar 3, 2018 - Swift
Memory Scanner used to create default memory map of vanilla Starcraft 1.16.1 known EUDs
-
Updated
Jun 4, 2018 - Python
Improve this page
Add a description, image, and links to the memory-scanning topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the memory-scanning topic, visit your repo's landing page and select "manage topics."
Extend the Memory Access Protocol module to output each access
and the respective functions accessing it
Example:
: <list of functions ...>
0x00: 08040000 08230DE4 03091124