OldSchoolHack

Registrieren / Anmelden Deutsch

CrySearch Memory Scanner

icon Thema: [Release] CrySearch Memory Scanner

Anmeldungsdatum: Aug 2007

Beiträge: 8646

Benutzer-Bewertung:

199 positiv
33 negativ
Kategorie: Tools
Entwickler: evolution536

Beschreibung:
Welcome to the release thread of CrySearch. CrySearch is a project I have been working on by myself, for almost half a year now. It mainly is a project of which I desired to learn as much as possible. CrySearch does not contain any copypasta, because I like to write everything myself, preferrably as optimized as possible. CrySearch is a Cheat Engine-like application, but because my taste and feel is different, my application works in quite a different way, with quite a lot of features that are not included in Cheat Engine. I designed the user interface in a way that the toolbar should provide program flow for the user. Cheat Engine's user interface is very populated and the actual disassembling tools are particularly hidden away in the memory viewer. I tend to differ from this approach.
  1. Accessing processes remotely, also system processes when running as Administrator;
  2. Memory scanning for primitive types, strings and byte sequences;
  3. Filtering scan results (a.k.a. Next scan);
  4. Creating, saving and reusing address tables containing scan results.
  5. Changing values at memory addresses and freeze them;
  6. Viewing PE (Portable Executable) information about the opened process;
  7. Viewing and dumping sections;
  8. Viewing threads, change priority, suspend, resume and create threads remotely;
  9. Viewing, injecting, ejecting, dumping and hiding modules, and restore PE headers from a file on the disk;
  10. Allocating memory blocks remotely;
  11. Generating code snippets from address tables;
  12. Hotkeys to automate actions that do not require user input;
  13. Viewing import address table of loaded process and its modules;
  14. Settings hooks on the IAT of a process and its modules and restoring export addresses;
  15. Viewing PEB and TEB's for loaded process and its threads, including manipulation of certain associated information;
  16. Viewing and closing handles in the loaded process;
  17. Disassembling executable pages in a process to provide memory view and program flow control;
  18. Walking heaps in the opened process as side feature of the disassembler;
  19. Debugging executable code and data to find out what the flow of a program is.


Screenshots:
https://www.oldschoolhack.me/hackdata/screenshot/thumb/81111f93254b8861c0bd1aefb3868032.jpg

Download:
CrySearch Memory Scanner v1.09

__________________

Hallo
1 positiv
0 negativ
Dieser Beitrag wurde bewertet von:
iChioXx (So 13. Apr 2014, 16:41)