Process Hacker v1.7 Released – Process Viewer & Memory Editor

Your website & network are Hackable


Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful process termination and a Regex memory searcher. It can show services, processes and their threads, modules, handles and memory regions.

Key Features

  • Viewing, terminating, suspending and resuming processes.
  • Restarting processes, creating dump files, detaching from any debuggers, viewing heaps, injecting DLLs, etc.
  • Viewing detailed process information, statistics, and performance information.
  • Viewing, terminating, suspending and resuming threads.
  • Viewing detailed token information (including modifying privileges).
  • Viewing and unloading modules.
  • Viewing memory regions.
  • Viewing environment variables.
  • Viewing and closing handles.
  • Viewing, controlling and editing services.
  • Viewing and closing network connections.

System Requirements

  • .NET Framework 2.0
  • Microsoft Windows XP SP2 or above, 32-bit or 64-bit.

You can download Process Hacker v1.7 here:

processhacker-1.7-setup.exe

Or read more here.


Posted in: Forensics, Windows Hacking

, , , , , , , , ,

Recent in Forensics:
- Web Application Log Forensics After a Hack
- CapTipper – Explore Malicious HTTP Traffic
- Google Rapid Response (GRR ) – Remote Live Forensics For Incident Response

Related Posts:

Most Read in Forensics:
- NetworkMiner – Passive Sniffer & Packet Analysis Tool for Windows - 66,423 views
- raw2vmdk – Mount Raw Hard Disk (dd) Images As VMDK Virtual Disks - 34,254 views
- OpenDLP – Free & Open-Source Data Loss Prevention (DLP) Tool - 28,740 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


One Response to Process Hacker v1.7 Released – Process Viewer & Memory Editor

  1. d3m4s1@d0v1v0 December 1, 2009 at 11:31 am #

    I was playing a little with this tool and looks very interesting. One needs this kind of tools on Windows if wants to see what happens in the core.
    Like always, thanks for the info.