Process Hacker 2.30
Process Hacker can terminate, suspend, resume, restart and set the priority of processes. Processes are highlighted to provide additional information such as whether they are elevated or in a job. More interesting things you can do with processes includes injecting DLLs and even replacing security tokens (XP only). Processes Threads Threads It can also terminate, suspend, resume and set the priority of threads. Symbolic start addresses are provided, and double-clicking a thread will show its call stack. Additionally, GUI threads (threads which have made at least one call to a GUI function) are highlighted. Modules It can display the modules loaded by each process and their properties. It can also find the address of any exported function in a module, change page protection of the module`s memory region, and read the module`s memory. Token Token It can display each process` primary token and its user, source, groups and privileges. It even allows you to enable and disable privileges. Memory It can display (using VirtualQueryEx()) the memory regions in a process` virtual memory space, and even read/write data using a built-in hex editor. Memory Memory Editor Handles It can display the handles opened by processes and can close them. Handles Search Process Hacker also supports saving memory search results and even intersecting (finding common items between) two sets of search results!
(1.13MB, Extension: ZIP)
Download alternate to Process Hacker solution
Look at the free or trial alternatives and similar apps to Process Hacker software by the tags. It's possible also to find substitutes for the most popular titles in the Operating System Utils category.
Predicted future versions and notices:
The doDownload.com constantly monitors the update of all programs, including information from the Process Hacker 2.30 changelog file, however sometimes it can happen that data are not complete or are outdated.We assume that author continue's to develop 2.31 version with further advanced features, and soon you will be informed. Equally important 3.0 upgrades of the program we will continue to monitor. Full Process Hacker description has been compared with the overall software database and our algorithm has found the following applications (are showed below).