hollows_hunter Logo

hollows_hunter

A process scanning tool that detects and dumps malicious implants, shellcodes, hooks, and memory patches in running processes.

2,318
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

hollows_hunter Description

hollows_hunter is a process scanning tool that analyzes all running processes on a system to identify potentially malicious implants and modifications. The tool detects various types of malicious activities including: - Replaced or implanted PE (Portable Executable) files - Shellcode injections in process memory - API hooks and function redirections - In-memory patches and modifications Built on the PE-sieve library, hollows_hunter provides automated scanning capabilities to identify processes that have been compromised or modified by malware. The tool can dump detected malicious implants for further analysis. The scanner operates by examining process memory structures and comparing them against expected patterns to identify anomalies that may indicate malicious activity. It supports recursive cloning for development and is available through multiple distribution channels including direct releases and package managers like Chocolatey.

hollows_hunter FAQ

Common questions about hollows_hunter including features, pricing, alternatives, and user reviews.

hollows_hunter is A process scanning tool that detects and dumps malicious implants, shellcodes, hooks, and memory patches in running processes.. It is a Security Operations solution designed to help security teams with Pe File, Shellcode, Memory Forensics.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Joe Sandbox DEC Logo

Plugin that decompiles malware PE files into readable C code using hybrid analysis.

0
WindowsSCOPE Logo

A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.

0
CAPA Logo

CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.

0
IRTriage Logo

Automated collection tool for incident response triage in Windows systems.

0
capa Logo

Capa is a malware analysis tool that detects capabilities in executable files by analyzing PE, ELF, .NET modules, shellcode, and sandbox reports to identify potential malicious behaviors with ATT&CK framework mapping.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox