0
I Use This!
Very Low Activity
Analyzed about 14 hours ago. based on code collected about 14 hours ago.

Project Summary

Scanmem & GameConquerorscanmem is a simple interactive debugging utility for linux, used to locate the address of a variable in an executing process. This can be used for the analysis or modification of a hostile process on a compromised machine, reverse engineering, or as a "pokefinder" to cheat at video games.

since version 0.08, scanmem includes a GUI called GameConqueror.

A PPA is available here: https://launchpad.net/~coolwanglu/+archive/scanmem

FeaturesInteractive command mode, with online help. Efficient and easy-to-use syntax. Support different types of variable: int{8|16|32|64}, float{32|64} -- known type and width int, float -- known type, unknown width number -- neither unknown, just guess bytearray, string -- powerful for advance usage Support different types of scan: equalto greaterthan, lessthan changed, unchanged increased(by), decrased(by) Set variable to any value. Detailed information about mappings, allow users to eliminate regions. More in GameConqueror:

User-friendly CheatEngline-alike interface Modify and lock(freeze) variables Memory Viewer/Editor

GameConqueror Graphical Frontend

Standard Command Line Interface

Tags

analysis cheat debug game gui memory pokefinder reveng

GNU General Public License v3.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Use Patent Claims

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

Include Install Instructions

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    nearly 1 in 3 companies have no process for identifying, tracking, or remediating known open source vulnerabilities
  • ...
    you can embed statistics from Open Hub on your site
  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    anyone with an Open Hub account can update a project's tags
About Project Security

Languages

Languages?height=75&width=75
C
66%
Python
19%
XML
10%
3 Other
5%

30 Day Summary

Apr 9 2021 — May 9 2021

12 Month Summary

May 9 2020 — May 9 2021
  • 5 Commits
    Down -13 (72%) from previous 12 months
  • 3 Contributors
    Down -1 (25%) from previous 12 months