XNetDumper is a tool for dumping processes from memory to executable files on disk. It is written in Qt C++ for cross-platform compatibility and provides a simple yet powerful interface for extracting and analyzing processes from memory, making it useful for forensic analysis, malware research, and reverse engineering.
- Process Dumping (Coming Soon): Dump processes from memory to executable files on disk.
- Memory Address Patching (Coming Soon): Patch values at given memory addresses for runtime modification.
- Memory Inspection: Analyze memory contents for processes and extract specific ones.
- Save/Load: Save dumped executables to disk for further analysis.
- Cross-Platform: Works on multiple platforms including Windows, Linux, and macOS.
- User-friendly Interface: Simple graphical user interface built with Qt for ease of use.
- Go to the Releases page of this repository.
- Download the latest release executable for your operating system (Windows, Linux, or macOS).
- Run the downloaded executable to launch XNetDumper.
- Clone the repository: git clone https://github.com/horsicq/XNetDumper.git
- Navigate to the project directory: cd XNetDumper
- Build the project using Qt Creator or your preferred IDE.
- Run XNetDumper executable.
Simply launch the XNetDumper application and use the graphical interface to perform memory inspection and analysis. Stay tuned for the upcoming features for process dumping and memory address patching!
Contributions are welcome! If you have any suggestions, bug reports, or feature requests, please open an issue or submit a pull request.
This project is licensed under the MIT License - see the LICENSE file for details.
- Thanks to the Qt framework for enabling cross-platform development.
- Inspired by similar tools for memory analysis and process dumping.