0
I Use This!
Very Low Activity
Analyzed about 3 hours ago. based on code collected about 5 hours ago.

Project Summary

Scanmem & GameConquerorscanmem is a simple interactive debugging utility for linux, used to locate the address of a variable in an executing process. This can be used for the analysis or modification of a hostile process on a compromised machine, reverse engineering, or as a "pokefinder" to cheat at video games.

since version 0.08, scanmem includes a GUI called GameConqueror.

A PPA is available here: https://launchpad.net/~coolwanglu/+archive/scanmem

FeaturesInteractive command mode, with online help. Efficient and easy-to-use syntax. Support different types of variable: int{8|16|32|64}, float{32|64} -- known type and width int, float -- known type, unknown width number -- neither unknown, just guess bytearray, string -- powerful for advance usage Support different types of scan: equalto greaterthan, lessthan changed, unchanged increased(by), decrased(by) Set variable to any value. Detailed information about mappings, allow users to eliminate regions. More in GameConqueror:

User-friendly CheatEngline-alike interface Modify and lock(freeze) variables Memory Viewer/Editor

GameConqueror Graphical Frontend

Standard Command Line Interface

Tags

analysis cheat debug game gui memory pokefinder reveng

In a Nutshell, scanmem...

GNU General Public License v3.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Use Patent Claims

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

Include Install Instructions

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    use of OSS increased in 65% of companies in 2016
  • ...
    data presented on the Open Hub is available through our API
  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    learn about Open Hub updates and features on the Open Hub blog
About Project Security

Languages

C
66%
Python
19%
XML
10%
3 Other
5%

30 Day Summary

Jul 20 2022 — Aug 19 2022

12 Month Summary

Aug 19 2021 — Aug 19 2022
  • 1 Commits
    Down -2 (66%) from previous 12 months
  • 1 Contributors
    Down -1 (50%) from previous 12 months