Hosting a collection of memory analysis functions, this repository performs scans for patterns within process memory regions. Drawing inspiration from the IDA (Interactive Disassembler) code analysis pattern, these functions search for specific sequences of bytes, commonly referred to as patterns, within memory locations of a running process. This aids in identifying data structures, specific instructions, and other relevant information during reverse engineering and malware analysis activities. The functions employ technical terms such as 'signature,' 'offset,' 'pointer,' 'base address,' and 'memory read' to efficiently and accurately locate and interpret patterns.
-
Notifications
You must be signed in to change notification settings - Fork 0
DennysBarreto/PatternFind
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Memory analysis functions for scanning patterns within process memory, aiding reverse engineering and malware analysis using technical terms like 'signature,' 'offset,' and 'memory read'.
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published