
hollows_hunter
#Security Testing#Malware Analysis
Studying Android malware behaviors through Information Flow monitoring techniques.
Scans All Running Processes for Malicious Activity
Identifies and extracts various potentially harmful implants, including replaced or implanted Portable Executables (PEs), shellcodes, hooks, and in-memory patches.
Uses: PE-sieve (library version).
PE-sieve FAQ
- Frequently Asked Questions
Read Wiki Clone: To obtain the repository along with all its submodules, use the command: git clone --recursive https://github.com/hasherezade/hollows_hunter.git
Builds: Download the latest release or learn more about the build process. The tool is also available through Chocolatey.

