{"id":2958,"date":"2018-10-08T20:32:51","date_gmt":"2018-10-08T15:02:51","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=2958"},"modified":"2018-10-08T20:32:51","modified_gmt":"2018-10-08T15:02:51","slug":"xenoscan-memory-scanner","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/","title":{"rendered":"XenoScan &#8211; Open source memory scanner written in C++"},"content":{"rendered":"<p><strong>XenoScan<\/strong> is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values. These types of tools are typically used when hacking video games, as they allow one to locate the values representing the game&#8217;s state in memory.<\/p>\n<p>XenoScan is written in C++ with a Lua frontend, and I&#8217;ve been working on advanced functionality that goes beyond anything that has been in any other memory scanners I&#8217;ve seen. Notably, it has a way to enumerate and return all complex data structures (such as std::list and std::map) in the target&#8217;s memory space, and it can even scan for any class instances and group the discovered instances by their underlying types.<\/p>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span><a href=\"https:\/\/kalilinuxtutorials.com\/dbgshell\/\" target=\"_blank\" rel=\"noopener\">DbgShell \u2013 A PowerShell Front-End For The Windows Debugger Engine<\/a><\/strong><\/p>\n<h2 style=\"text-align: center;\"><strong>XenoScan Sub-projects<\/strong><\/h2>\n<h3><strong>XenoLua<\/strong><\/h3>\n<p>XenoLua is a wrapper around Lua that provides a ton of functionality. Most notably, it provides a <code>LuaVariant<\/code> class which wraps the functionality of converting between <code>C<\/code>\/<code>C++<\/code> and <code>Lua<\/code> types. Additionally, it has helper functions for working with Lua in the <code>LuaPrimitive<\/code> class.<\/p>\n<h3><strong>XenoScanEngine<\/strong><\/h3>\n<p>XenoScanEngine is the meat of the project. It contains the code for the scanning, data structure detection, and everything else.<\/p>\n<h3><strong>XenoScanLua<\/strong><\/h3>\n<p>XenoScanLua ties XenoScanEngine to XenoLua to provide a Lua-scriptable frontend for the scanner. Currently, this is the only entry-point to the scanner.<\/p>\n<p>Additionally, this project contains some test code that ensures everything is working properly. A test is a combination of a <strong><span style=\"color: #008000;\"><code><span style=\"color: #008000;\">.cpp<\/span><\/code><\/span><\/strong>, a <span style=\"color: #008000;\"><code><span style=\"color: #008000;\"><strong>.h<\/strong><\/span><\/code><\/span>, and a <code><span style=\"color: #008000;\">.lua<\/span><\/code> file. For examples on how to use the scanner, you can check out the <code>.lua<\/code> test files.<\/p>\n<h2><strong>Compiling<\/strong><\/h2>\n<p><em>XenoScan<\/em> uses <em>CMake<\/em>, and has been tested with Visual Studio 2017. In theory, you should be able to build the code with any modernish compiler, as long as you use CMake to generate the project files. Before you can compile, you will need to make sure you&#8217;ve checked out the submodules. Once that&#8217;s done, you&#8217;ll also have to build the <em>luajit<\/em> submodule so <em>XenoScan<\/em> can link against the libraries.<\/p>\n<p>If you&#8217;re using Visual Studio, this should be easy. Simply run <code>buildmsvc2017.bat<\/code> from a <em>Developer Command Prompt for VS<\/em>. As an example, to build a project for <em>Visual Studio 2017<\/em>, I run<\/p>\n<pre><code><strong><span style=\"color: #008000;\">cd C:\\path\\to\\XenoScan\nbuildmsvc2017.bat\n<\/span><\/strong><\/code><\/pre>\n<p>Which would make a file named <span style=\"color: #008000;\"><code>XenoScan.sln<\/code><\/span> appear in my <code>build<\/code> directory (e.g. <code><span style=\"color: #008000;\">C:\\path\\to\\XenoScan\\build<\/span><\/code>).<\/p>\n<p>The main development of XenoScan is done on this version of Visual Studio.<\/p>\n<h2 style=\"text-align: center;\"><strong>Platform<\/strong><\/h2>\n<p>The code is designed to be platform-agnostic. Theoretically, to compile on any other platform, you would need to<\/p>\n<ol>\n<li>Create project\/make files for your target IDE\/compiler.<\/li>\n<li>Remove the <code><span style=\"color: #008000;\">ScannerTargetWindows.cpp<\/span><\/code> and <span style=\"color: #008000;\"><code>ScannerTargetWindows.h<\/code><\/span> files from the project.<\/li>\n<li>Implement the <code><span style=\"color: #008000;\">ScannerTarget<\/span><\/code> interface for your platform.<\/li>\n<li>Add your implementation to the project.<\/li>\n<li>???? <em>profit<\/em><\/li>\n<\/ol>\n<h2 style=\"text-align: center;\"><strong>Features<\/strong><\/h2>\n<p><strong>Basic scanning functionality supports the following types:<\/strong><\/p>\n<ul>\n<li>Integral types*:\n<ul>\n<li><code>int8_t<\/code><\/li>\n<li><code>uint8_t<\/code><\/li>\n<li><code>int16_t<\/code><\/li>\n<li><code>uint16_t<\/code><\/li>\n<li><code>int32_t<\/code><\/li>\n<li><code>uint32_t<\/code><\/li>\n<li><code>int64_t<\/code><\/li>\n<li><code>uint64_t<\/code><\/li>\n<\/ul>\n<\/li>\n<li><code>float<\/code><\/li>\n<li><code>double<\/code><\/li>\n<li>ascii strings<\/li>\n<li>wide strings<\/li>\n<li>Custom data structures (think <code>C++<\/code> <code>struct<\/code>)\n<ul>\n<li>Can consist of any combination integral and decimal types<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><sub>* <em>Lua frontend may choke on 64-bit integers, but the scanner library supports them.<\/em><\/sub><\/p>\n<p><strong>Scanning supports the following types of matching:<\/strong><\/p>\n<ul>\n<li>Equal to<\/li>\n<li>Greater than<\/li>\n<li>Greater than or equal to<\/li>\n<li>Less than<\/li>\n<li>Less than or equal to<\/li>\n<li>Ranges (<code>min &lt;= check &lt;= max<\/code>)<\/li>\n<\/ul>\n<p><strong>Additionally, there is functionality to detect all instances of the following types:<\/strong><\/p>\n<ul>\n<li><code>std::map<\/code><\/li>\n<li><code>std::list<\/code><\/li>\n<li>Any class with a virtual-function table<\/li>\n<\/ul>\n<p><a href=\"https:\/\/github.com\/nickcano\/XenoScan\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><strong>Credit: hackermans<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values. These types of tools are typically used when hacking video games, as they allow one to locate the values representing the game&#8217;s state in memory. XenoScan is written in C++ with a [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[3813,3814,3815,3816],"class_list":["post-2958","post","type-post","status-publish","format-standard","hentry","category-kali","tag-xenolua","tag-xenoscan","tag-xenoscanengine","tag-xenoscanlua"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>XenoScan - Open source memory scanner written in C++<\/title>\n<meta name=\"description\" content=\"XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XenoScan - Open source memory scanner written in C++\" \/>\n<meta property=\"og:description\" content=\"XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-08T15:02:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"XenoScan &#8211; Open source memory scanner written in C++\",\"datePublished\":\"2018-10-08T15:02:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/\"},\"wordCount\":530,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"keywords\":[\"XenoLua\",\"XenoScan\",\"XenoScanEngine\",\"XenoScanLua\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/\",\"name\":\"XenoScan - Open source memory scanner written in C++\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"datePublished\":\"2018-10-08T15:02:51+00:00\",\"description\":\"XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XenoScan - Open source memory scanner written in C++","description":"XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/","og_locale":"en_US","og_type":"article","og_title":"XenoScan - Open source memory scanner written in C++","og_description":"XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values.","og_url":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-10-08T15:02:51+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"XenoScan &#8211; Open source memory scanner written in C++","datePublished":"2018-10-08T15:02:51+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/"},"wordCount":530,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","keywords":["XenoLua","XenoScan","XenoScanEngine","XenoScanLua"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/","url":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/","name":"XenoScan - Open source memory scanner written in C++","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","datePublished":"2018-10-08T15:02:51+00:00","description":"XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/xenoscan-memory-scanner\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4317,"url":"https:\/\/kalilinuxtutorials.com\/mxtract-memory-extractor-analyser\/","url_meta":{"origin":2958,"position":0},"title":"MXtract &#8211; Memory Extractor &#038; Analyser","author":"R K","date":"March 22, 2019","format":false,"excerpt":"MXtract is an opensource Linux based tool that analyses and dumps memory. Its developed as an offensive pentration testing tool which can be used to scan memory for private keys, IP, and passwords using regexes. Remember your results are only as good as your regexes. In most Linux environments users\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37030,"url":"https:\/\/kalilinuxtutorials.com\/process-ghosting-in-rust\/","url_meta":{"origin":2958,"position":1},"title":"Process Ghosting In Rust : Crafting Evasive Applications On Windows","author":"Varshini","date":"March 13, 2025","format":false,"excerpt":"Process ghosting is a sophisticated technique used to evade detection by security tools on Windows systems. It involves creating a temporary file, marking it for deletion, and then executing its contents from memory without leaving a persistent file on disk. This method allows malicious code to run undetected, as traditional\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Process-Ghosting-In-Rust-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Process-Ghosting-In-Rust-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Process-Ghosting-In-Rust-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Process-Ghosting-In-Rust-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Process-Ghosting-In-Rust-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Process-Ghosting-In-Rust-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":27639,"url":"https:\/\/kalilinuxtutorials.com\/dismember\/","url_meta":{"origin":2958,"position":2},"title":"Dismember : Scan Memory For Secrets And More","author":"R K","date":"November 21, 2022","format":false,"excerpt":"Dismember is a command-line toolkit for Linux that can be used to scan the memory of all processes (or particular ones) for common secrets and custom regular expressions, among other things. It will eventually become a full \/proc toolkit. Using the grep command, it can match a regular expression across\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIt3XUHmPvC1JI47DZz5Q-RZOlehIeLAFxptwg8kYelD1VNPT0cUC3Gf0s9yGzAyKdzdgh1EeDKiiWO-HM1LIOoIuEwcRSPeQoBEML7un4TKoT_JgFfDrxawJf52LVxw9Av-VwjueccZbXtfvRUbC5DHs-wPyaIuZK9yBtgi-8JkreAcq3XhZL76mQ\/s1573\/demo.gif?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIt3XUHmPvC1JI47DZz5Q-RZOlehIeLAFxptwg8kYelD1VNPT0cUC3Gf0s9yGzAyKdzdgh1EeDKiiWO-HM1LIOoIuEwcRSPeQoBEML7un4TKoT_JgFfDrxawJf52LVxw9Av-VwjueccZbXtfvRUbC5DHs-wPyaIuZK9yBtgi-8JkreAcq3XhZL76mQ\/s1573\/demo.gif?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIt3XUHmPvC1JI47DZz5Q-RZOlehIeLAFxptwg8kYelD1VNPT0cUC3Gf0s9yGzAyKdzdgh1EeDKiiWO-HM1LIOoIuEwcRSPeQoBEML7un4TKoT_JgFfDrxawJf52LVxw9Av-VwjueccZbXtfvRUbC5DHs-wPyaIuZK9yBtgi-8JkreAcq3XhZL76mQ\/s1573\/demo.gif?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIt3XUHmPvC1JI47DZz5Q-RZOlehIeLAFxptwg8kYelD1VNPT0cUC3Gf0s9yGzAyKdzdgh1EeDKiiWO-HM1LIOoIuEwcRSPeQoBEML7un4TKoT_JgFfDrxawJf52LVxw9Av-VwjueccZbXtfvRUbC5DHs-wPyaIuZK9yBtgi-8JkreAcq3XhZL76mQ\/s1573\/demo.gif?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIt3XUHmPvC1JI47DZz5Q-RZOlehIeLAFxptwg8kYelD1VNPT0cUC3Gf0s9yGzAyKdzdgh1EeDKiiWO-HM1LIOoIuEwcRSPeQoBEML7un4TKoT_JgFfDrxawJf52LVxw9Av-VwjueccZbXtfvRUbC5DHs-wPyaIuZK9yBtgi-8JkreAcq3XhZL76mQ\/s1573\/demo.gif?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIt3XUHmPvC1JI47DZz5Q-RZOlehIeLAFxptwg8kYelD1VNPT0cUC3Gf0s9yGzAyKdzdgh1EeDKiiWO-HM1LIOoIuEwcRSPeQoBEML7un4TKoT_JgFfDrxawJf52LVxw9Av-VwjueccZbXtfvRUbC5DHs-wPyaIuZK9yBtgi-8JkreAcq3XhZL76mQ\/s1573\/demo.gif?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33617,"url":"https:\/\/kalilinuxtutorials.com\/elfiescanner\/","url_meta":{"origin":2958,"position":3},"title":"ELFieScanner &#8211; Advanced Threat Detection Techniques In Linux Process Memory","author":"Varshini","date":"July 3, 2024","format":false,"excerpt":"A C++ POC for advanced process memory scanning that attempts to detect a number of malicious techniques used by threat actors & those which have been incorporated into open-source user-mode rootkits. ELFieScanner inspects every running process (both x86\/x64) and its corresponding loaded libraries to look for evil. It then outputs\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZ1XTFxWxn0r8g55Clqj18aZYN5YY8Kr_R4ioIu85HpPLkdcT08NKccBwdpWZmVgQJYEnIjqruvZ0XJyanBUrdXZySP7zeJ2b90gAEhpCOzkdKcFmM-OvYRRmEh4N5dQ5VbfdX9pJ6WBREhg8EaQcgPdYiYPbLUbOYXHQ4DTaSAMtHBWfemD3bWRQr5Ha5\/s16000\/ELFieScanner%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZ1XTFxWxn0r8g55Clqj18aZYN5YY8Kr_R4ioIu85HpPLkdcT08NKccBwdpWZmVgQJYEnIjqruvZ0XJyanBUrdXZySP7zeJ2b90gAEhpCOzkdKcFmM-OvYRRmEh4N5dQ5VbfdX9pJ6WBREhg8EaQcgPdYiYPbLUbOYXHQ4DTaSAMtHBWfemD3bWRQr5Ha5\/s16000\/ELFieScanner%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZ1XTFxWxn0r8g55Clqj18aZYN5YY8Kr_R4ioIu85HpPLkdcT08NKccBwdpWZmVgQJYEnIjqruvZ0XJyanBUrdXZySP7zeJ2b90gAEhpCOzkdKcFmM-OvYRRmEh4N5dQ5VbfdX9pJ6WBREhg8EaQcgPdYiYPbLUbOYXHQ4DTaSAMtHBWfemD3bWRQr5Ha5\/s16000\/ELFieScanner%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZ1XTFxWxn0r8g55Clqj18aZYN5YY8Kr_R4ioIu85HpPLkdcT08NKccBwdpWZmVgQJYEnIjqruvZ0XJyanBUrdXZySP7zeJ2b90gAEhpCOzkdKcFmM-OvYRRmEh4N5dQ5VbfdX9pJ6WBREhg8EaQcgPdYiYPbLUbOYXHQ4DTaSAMtHBWfemD3bWRQr5Ha5\/s16000\/ELFieScanner%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZ1XTFxWxn0r8g55Clqj18aZYN5YY8Kr_R4ioIu85HpPLkdcT08NKccBwdpWZmVgQJYEnIjqruvZ0XJyanBUrdXZySP7zeJ2b90gAEhpCOzkdKcFmM-OvYRRmEh4N5dQ5VbfdX9pJ6WBREhg8EaQcgPdYiYPbLUbOYXHQ4DTaSAMtHBWfemD3bWRQr5Ha5\/s16000\/ELFieScanner%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZ1XTFxWxn0r8g55Clqj18aZYN5YY8Kr_R4ioIu85HpPLkdcT08NKccBwdpWZmVgQJYEnIjqruvZ0XJyanBUrdXZySP7zeJ2b90gAEhpCOzkdKcFmM-OvYRRmEh4N5dQ5VbfdX9pJ6WBREhg8EaQcgPdYiYPbLUbOYXHQ4DTaSAMtHBWfemD3bWRQr5Ha5\/s16000\/ELFieScanner%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1637,"url":"https:\/\/kalilinuxtutorials.com\/volatility-framework-volatile-memory\/","url_meta":{"origin":2958,"position":4},"title":"Volatility Framework &#8211; Volatile memory extraction utility framework","author":"R K","date":"June 19, 2018","format":false,"excerpt":"The Volatility Framework is a totally open accumulation of tools, executed in Python under the GNU General Public License, for the extraction of computerized antiquities from unstable memory (RAM) tests. The extraction techniques are performed totally autonomous of the framework being researched yet offer visibilty into the runtime state of\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":13030,"url":"https:\/\/kalilinuxtutorials.com\/apsoft-web-scanner-v2\/","url_meta":{"origin":2958,"position":5},"title":"APSoft Web Scanner V2 : Powerful Dork Searcher &#038; Vulnerability Scanner For Windows Platform","author":"R K","date":"May 28, 2021","format":false,"excerpt":"APSoft Web Scanner V2 is a tool for Powerful Dork Searcher And Vulnerability Scanner For Windows Platform. Software Pictures What Can I Do With This ? with this software, you will be able to search your dorks in\u00a0supported search engines\u00a0and scan grabbed urls to find their vulnerabilities. in addition ,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/2958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=2958"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/2958\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=2958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=2958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=2958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}