Skip to content

Detects code differentials between executables in disk and the corresponding processes/modules in memory

License

Notifications You must be signed in to change notification settings

classicvalues/MemoryPatchDetector

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Memory Patch Detector

Detects code differentials between executables in disk and the corresponding processes/modules in memory

Requirements

pip install -r requirements.txt

Usage

python windows_memory_patches.py

Notes

The script needs Administrator/SYSTEM privileges in order to analyze all the processes in memory.
At the moment, it doesn't check WoW64 processes at all.

About

Detects code differentials between executables in disk and the corresponding processes/modules in memory

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%