0
I Use This!
Low Activity
Analyzed about 12 hours ago. based on code collected about 12 hours ago.

Project Summary

Scanmem & GameConquerorscanmem is a simple interactive debugging utility for linux, used to locate the address of a variable in an executing process. This can be used for the analysis or modification of a hostile process on a compromised machine, reverse engineering, or as a "pokefinder" to cheat at video games.

since version 0.08, scanmem includes a GUI called GameConqueror.

A PPA is available here: https://launchpad.net/~coolwanglu/+archive/scanmem

FeaturesInteractive command mode, with online help. Efficient and easy-to-use syntax. Support different types of variable: int{8|16|32|64}, float{32|64} -- known type and width int, float -- known type, unknown width number -- neither unknown, just guess bytearray, string -- powerful for advance usage Support different types of scan: equalto greaterthan, lessthan changed, unchanged increased(by), decrased(by) Set variable to any value. Detailed information about mappings, allow users to eliminate regions. More in GameConqueror:

User-friendly CheatEngline-alike interface Modify and lock(freeze) variables Memory Viewer/Editor

GameConqueror Graphical Frontend

Standard Command Line Interface

Tags

analysis cheat debug game gui memory pokefinder reveng

GNU General Public License v3.0 or later
Permitted

Place Warranty

Use Patent Claims

Commercial Use

Modify

Distribute

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Include Copyright

State Changes

Include License

Include Install Instructions

Disclose Source

These details are provided for information only. No information here is legal advice and should not be used as such.

All Licenses

This Project has No vulnerabilities Reported Against it

Did You Know...

  • ...
    Black Duck offers a free trial so you can discover if there are open source vulnerabilities in your code
  • ...
    compare projects before you chose one to use
  • ...
    nearly 1 in 3 companies have no process for identifying, tracking, or remediating known open source vulnerabilities
  • ...
    search using multiple tags to find exactly what you need

Languages

Languages?height=75&width=75
C
66%
Python
19%
XML
11%
3 Other
4%

30 Day Summary

Aug 21 2018 — Sep 20 2018

12 Month Summary

Sep 20 2017 — Sep 20 2018
  • 75 Commits
    Down -40 (34%) from previous 12 months
  • 5 Contributors
    Down 0 (0%) from previous 12 months