hasherezade/hollows_hunter

GitHub: hasherezade/hollows_hunter

一款基于 PE-sieve 的 Windows 命令行内存扫描工具,用于检测运行进程中的恶意植入物并支持内存转储。

Stars: 2317 | Forks: 286

# hollows_hunter ![](https://static.pigsec.cn/wp-content/uploads/repos/2026/03/c3074bb247154233.png) [![Build status](https://ci.appveyor.com/api/projects/status/nsc2eux5986y1shq?svg=true)](https://ci.appveyor.com/project/hasherezade/hollows-hunter) [![Codacy Badge](https://api.codacy.com/project/badge/Grade/0c149fcd62084f96ac0c131e4473dbdf)](https://app.codacy.com/gh/hasherezade/hollows_hunter/dashboard?branch=master) [![Commit activity](https://img.shields.io/github/commit-activity/m/hasherezade/hollows_hunter)](https://github.com/hasherezade/hollows_hunter/commits) [![Last Commit](https://img.shields.io/github/last-commit/hasherezade/hollows_hunter/master)](https://github.com/hasherezade/hollows_hunter/commits) [![GitHub release](https://img.shields.io/github/release/hasherezade/hollows_hunter.svg)](https://github.com/hasherezade/hollows_hunter/releases) [![GitHub release date](https://img.shields.io/github/release-date/hasherezade/hollows_hunter?color=blue)](https://github.com/hasherezade/hollows_hunter/releases) [![Github All Releases](https://img.shields.io/github/downloads/hasherezade/hollows_hunter/total.svg)](https://github.com/hasherezade/hollows_hunter/releases) [![Github Latest Release](https://img.shields.io/github/downloads/hasherezade/hollows_hunter/latest/total.svg)](https://github.com/hasherezade/hollows_hunter/releases) [![License](https://img.shields.io/badge/License-BSD%202--Clause-blue.svg)](https://github.com/hasherezade/hollows_hunter/blob/master/LICENSE) [![Platform Badge](https://img.shields.io/badge/Windows-0078D6?logo=windows)](https://github.com/hasherezade/hollows_hunter) Hollows Hunter 是一款基于 [PE-sieve](https://github.com/hasherezade/pe-sieve.git) 被动内存扫描器的命令行应用程序。它能识别并转储各种潜在的恶意植入物(被替换/植入的 PE、shellcode、钩子、内存补丁)。虽然在使用 PE-sieve 时你只能通过 PID 选择进程,但 Hollows Hunter 允许通过各种标准来选择进程,例如: + PID 列表 + 名称列表 + 创建时间(相对于 Hollows Hunter 的执行时间) 如果未选择特定目标,它将继续扫描所有可用进程。 Hollows Hunter 还允许通过 `/loop` 参数进行连续内存扫描,或者作为 ETW 监听器运行:在 `/etw` 模式下(仅限 64 位版本)。 📦 使用:[PE-sieve](https://github.com/hasherezade/pe-sieve.git)([库版本](https://github.com/hasherezade/pe-sieve/wiki/2.-How-to-build))。 ❓ [PE-sieve FAQ - 常见问题解答](https://github.com/hasherezade/pe-sieve/wiki/1.-FAQ) 📖 [阅读 Wiki](https://github.com/hasherezade/hollows_hunter/wiki) ## 克隆 请使用递归克隆来获取仓库及其所有子模块: ``` git clone --recursive https://github.com/hasherezade/hollows_hunter.git ``` ## 构建 下载最新的 [发布版本](https://github.com/hasherezade/hollows_hunter/releases),或者[了解更多](https://github.com/hasherezade/hollows_hunter/wiki#download)。 ![](https://community.chocolatey.org/favicon.ico) 也可通过 [Chocolatey](https://community.chocolatey.org/packages/hollowshunter) 获取
标签:Conpot, EDR, Hook检测, PE文件分析, Ruby on Rails, SecList, SSH蜜罐, UML, Windows安全, 云资产清单, 内存取证, 内存转储, 客户端加密, 库, 应急响应, 无文件攻击检测, 端点可见性, 网络安全, 脆弱性评估, 进程扫描, 进程注入, 进程镂空, 逆向工程, 隐私保护