Showing 25 open source projects for "memory dump"

View related business solutions
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 1
    objection

    objection

    Objection - runtime mobile exploration

    objection is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak. Perform memory-related tasks, such as dumping & patching. Explore and manipulate objects on the heap. Installation is simply a matter of pip3 install objection. This will give you the objection command. You can update an existing objection installation with pip3 install --upgrade objection. A file system listing of the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    py-spy

    py-spy

    Sampling profiler for Python programs

    py-spy is a sampling profiler for Python programs. It lets you visualize what your Python program is spending time on without restarting the program or modifying the code in any way. py-spy is extremely low overhead: it is written in Rust for speed and doesn't run in the same process as the profiled Python program. This means py-spy is safe to use against production Python code. py-spy works from the command line and takes either the PID of the program you want to sample from or the command...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Skiplist-CPP

    Skiplist-CPP

    A tiny KV storage based on skiplist written in C++ language

    ...It showcases how a log-structured, ordered index can deliver fast inserts, lookups, and deletes while remaining simple to implement and reason about. The project supplies a compact codebase with a clear separation between the skip list implementation and the storage operations that use it. Beyond in-memory operations, it demonstrates persistence through data dump to disk and reload, turning the structure into a tiny embeddable database. Stress-test scripts and example binaries are provided so you can benchmark throughput and validate correctness on your own machine. This makes the repo valuable for learners studying database internals and for practitioners who want a starting point for an embedded KV engine or educational experiments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Lockheed MAC 16 mini emulator

    Emulator for Lockheed Electronics Company MAC-16 minicomputer (1969)

    My first java program is an attempt to relive the days I spent maintaining a Lockheed Electronics Company minicomputer installation in an old electricity generating station. I had a little bit to do with this machine around 1978. There was two of them in a failover configuration with the standby machine available for program and data development. My goal is to get the development package called DEVSYS to run from a paper tape image that I have hung onto for all these years. The program has...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 5
    Alan Framework

    Alan Framework

    A C2 post-exploitation framework

    Alan Framework is a post-exploitation framework useful during red-team activities. You can run your preferred tool directly in-memory. JavaScript script execution (in-memory without third party dependency) Fully compliant SOCKS5 proxy. Supported agent types: Powershell (x86/x64), DLL (x86/x64), Executable (x86/x64), Shellcode (x86/x64). Server.exe can be executed in Linux (via dotnet core) The network communication is fully encrypted with a session key not recoverable from the agent binary or from a traffic dump. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    C64 65XE NES Debugger

    C64 65XE NES Debugger

    Commodore 64, Atari XL/XE and NES debugger that works in real time.

    This is Commodore 64, Atari XL/XE and NES code and memory debugger that works in real time. It is quick prototyping tool where you can play with Commodore 64 machine and its internals. C64 Debugger embeds VICE v3.1 C64 emulation engine created by The VICE Team and Atari800 v3.1.0 emulation engine created by the Atari800 team. Please note that project has been renamed to Retro Debugger and moved to https://github.com/slajerek/RetroDebugger Contact me at slajerek@gmail.com
    Leader badge
    Downloads: 19 This Week
    Last Update:
    See Project
  • 7
    TestDisk & PhotoRec

    TestDisk & PhotoRec

    Disk recovery utility

    TestDisk checks the partition and boot sectors of your disks. It is very useful in recovering lost partitions. It works with : DOS/Windows FAT12, FAT16 and FAT32NTFS ( Windows NT/2K/XP )Linux Ext2 and Ext3BeFS ( BeOS )BSD disklabel ( FreeBSD/OpenBSD/NetBSD )CramFS (Compressed File System)HFS and HFS+, Hierarchical File SystemJFS, IBM's Journaled File SystemLinux RaidLinux Swap (versions 1 and 2)LVM and LVM2, Linux Logical Volume ManagerNetware NSSReiserFS 3.5, 3.6 and 4Sun Solaris i386...
    Leader badge
    Downloads: 391 This Week
    Last Update:
    See Project
  • 8
    p2000floppy

    p2000floppy

    tools for the floppy format of the Sequential Prophet 2000/2002

    p2000floppy: tools for the floppy format of the Sequential Circuits Prophet 2000/2002 Included tools: * p2000floppy2syx: convert floppy image file into syx-files and list contents * p2000syx2mid: convert syx-file into mid-file * p2000syx2floppy: convert syx-files into floppy image file Special features: parameter & sample dump to/from syx-files, sample memory export/import to/from WAV-file, listing of parameters & keyboard mappings, sec5-file import/export for executable code. Additional utility: p2000floppyio (read/write floppy image) Note: tools to convert between p2k- and syx-files can be found within the project "p2ksyx": https://sourceforge.net/projects/p2ksyx/ Copyright (c) 2018-2021 by Klaus Michael Indlekofer. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    peda

    peda

    Python Exploit Development Assistance for GDB

    Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Premier Construction Software Icon
    Premier Construction Software

    Premier is a global leader in financial construction ERP software.

    Rated #1 Construction Accounting Software by Forbes Advisor in 2022 & 2023. Our modern SAAS solution is designed to meet the needs of General Contractors, Developers/Owners, Homebuilders & Specialty Contractors.
    Learn More
  • 10
    Rdbtools

    Rdbtools

    Parse Redis dump.rdb files, Analyze Memory, and Export Data to JSON

    Rdbtools is a parser for Redis' dump.rdb files. The parser generates events similar to an XML sax parser and is very efficient memory-wise. Rdbtools is written in Python, though there are similar projects in other languages. Every run of RDB Tool requires to specify a command to indicate what should be done with the parsed RDB data. Valid commands are JSON, diff, justkeys, justkeyvals and protocol. The JSON command output is UTF-8 encoded JSON. By default, the callback try to parse RDB data...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    MimiPenguin

    MimiPenguin

    A tool to dump the login password from the current linux user

    A tool to dump the login password from the current linux desktop user. Adapted from the idea behind the popular Windows tool mimikatz. Takes advantage of cleartext credentials in memory by dumping the process and extracting lines that have a high probability of containing passwords. Will attempt to calculate each word's probability by checking hashes in memory, and regex searches. 2.0 introduces a clean port that aims to increase the speed of execution and portability
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Simple Dumping Monitor for Arduino

    Simple Dumping Monitor for Arduino

    Simple in use library to display dumps and debug Arduino sketches.

    Simple Dumping Monitor Library (DumpMon) for Arduino-compatible ATmega microcontroller based boards allow to display either memory, registers and timer dumps and also interrupt vectors table dump. Beginning since version 0.6 functions of simple symbolic debugger are added. Being compiled the library requires about 11 KBytes of program memory (15 KBytes for Arduino MEGA). Requirements to RAM memory don't exceed 1 KByte (277 Bytes for dumpmon.pde example, 377 Bytes for dumpmonDebug.pde).
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    Cuckoo Sandbox

    Cuckoo Sandbox

    Cuckoo Sandbox is for automated analysis of malware

    Cuckoo Sandbox uses components to monitor the behavior of malware in a Sandbox environment; isolated from the rest of the system. It offers automated analysis of any malicious file on Windows, Linux, macOS, and Android.
    Downloads: 32 This Week
    Last Update:
    See Project
  • 14
    xowa

    xowa

    A free, open-source, offline Wikipedia application

    XOWA is a desktop application for reading and editing Wikipedia offline (XOWA has moved to http://gnosygnu.github.io/xowa/download.html)
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    Core Analyzer

    Core Analyzer

    A power tool to debug core dump, memory corruption, optimized code.

    ...By parsing a core dump file or a live process's memory, core analyzer is able to scan the target's heap data for memory corruption, search the whole address space for data object's references, or analyze memory pattern. It is thorough, labor-free, and insightful. I use the tool on daily basis and it is proved to be invaluable to debug many tough issues.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    pljones TrapKAT Editor for .Net/MONO
    This program has been superseded by a JVM version. Source is on github: https://github.com/pljones/jTrapKATEditor For further details, click the web site link below.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Similar Image Search

    Similar Image Search

    Reverse image search your photos. Find duplicates. Find similars

    ...SiS can search for similar images in the library and return a list of matches. I can also compare ones outside the library to ones within. It's designed for photographers to sift through a memory card dump, searching for photos in batches for ease of sorting. Requires: Java 7
    Downloads: 9 This Week
    Last Update:
    See Project
  • 18
    Ruby Serial

    Ruby Serial

    Optimized serialization library for Ruby objects.

    Library serializing Ruby objects, optimized in many ways: * Fast and small: use MessagePack (binary compact storage) and don't serialize twice the same object * Independent of Ruby version: dump and load data across different versions * Keep shared objects: if an object is shared by others, serialization still keeps the reference and does not duplicate objects in memory * Gives the ability to fine tune which attributes of your objects are to be serialized (defaults to all) * Keeps backward compatibility with previously serialized versions * Has callbacks support to fine tune the serialization process * Can serialize objects having reference cycles (self-contained Arrays, Hashes, objects...)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Java Secure String

    Java class for secure long-term in memory storage of sensitive strings

    A compact fast performing Java class SecureString enables long-term storage of sensitive strings that is resilient against a privileged insider, i.e. makes it hard to introspect its content from a memory dump. Click the home page link for a white paper with details and discussion on the subject of in-memory storage of sensitive data in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The Compile Memory Analysis Tool (CMAT) is a self-contained memory analysis tool that analyzes a Windows O/S memory (either in a dump or via XenAccess in a Xen VM) and extracts information about the operating system and the running processes.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    GP2X Hardware Library
    Library which allows developper to access the hardware features of GP2X (personal entertainment player created by a Korean company: GPH). Software emulation is provided on PC through SDL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Linux command line query programme for the WH1081 weather station. (Not tried it on windoze)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Process Memory Dumper it's developed for IT Consultants IT Security Consultants that need to dump the entire memory of a process and/or save informations about all running processes and modules. It's developed in C++ using MFC
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material. First and foremost for memory dump analysis and forensics usage. Able to identify AES, Serpent, Twofish and RSA keys as of version 0.0.3.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB