hollows_hunter

hollows_hunter

#Security Testing#Malware Analysis

Studying Android malware behaviors through Information Flow monitoring techniques.

Visit Website

Scans All Running Processes for Malicious Activity

Identifies and extracts various potentially harmful implants, including replaced or implanted Portable Executables (PEs), shellcodes, hooks, and in-memory patches. Uses: PE-sieve (library version). PE-sieve FAQ - Frequently Asked Questions Read Wiki Clone: To obtain the repository along with all its submodules, use the command: git clone --recursive https://github.com/hasherezade/hollows_hunter.git Builds: Download the latest release or learn more about the build process. The tool is also available through Chocolatey.