01Automated detection of suspicious executable injected memory regions using malfind
020 GitHub stars
03Detailed VAD (Virtual Address Descriptor) tree analysis for identifying RWX permissions
04Structured JSON report generation for suspicious processes and memory indicators
05Extraction and hashing of embedded shellcode for further forensic investigation
06Signature-based scanning for common NOP sled patterns and exploitation artifacts