memhunter
Endpoint sensor
Automated endpoint sensor tool to detect memory-resident malware without requiring memory dumps
Live hunting of code injection techniques
375 stars
34 watching
90 forks
Language: C++
last commit: about 5 years ago Related projects:
Repository | Description | Stars |
---|---|---|
mobileforensicsresearch/mem | Tool to dump memory from Android devices | 66 |
huoji120/duckmemoryscan | A tool to detect memory-based evasion techniques used in malware and rootkits | 702 |
rek7/mxtract | Analyzes and dumps memory to extract sensitive information from running processes | 582 |
maoni0/mem-doc | A resource for .NET memory analysis and diagnostics | 1,828 |
citypw/lcamtuf-memfetch | A utility to dump all memory of a running process on demand | 40 |
trainr3kt/memreader_bof | A tool that searches and extracts specific strings from another process's memory | 41 |
tencent/habomalhunter | Automates malware analysis on Linux systems to extract and analyze static and dynamic features | 732 |
cue/polarbear | A tool to diagnose OutOfMemoryError conditions in Java applications | 21 |
marcosh/crem | A compositional language for designing and executing state machines | 108 |
maaaaz/androwarn | Analyze Android app malice and detect malicious behaviors | 484 |
zer0mem0ry/kernelreadwritememory | A proof-of-concept project demonstrating kernel-level memory manipulation on Windows NT | 275 |
nccgroup/windowsmempagedelta | Software designed to monitor Windows executable memory page changes to detect anomalies in system behavior | 28 |
3lp4tr0n/beaconhunter | A tool for detecting and responding to potential Cobalt Strike beacons using Extended Trace Record (ETW) tracing | 481 |
mhaggis/hunt-detect-prevent | A collection of resources and tools for detecting and preventing malicious activity on Windows systems. | 162 |
antique-team/memcad | Analyzes C code for its memory layout and dependencies | 25 |