Name: processhacker
Owner: Process Hacker
Description: A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
Created: 2016-02-01 08:10:21.0
Updated: 2018-02-20 11:47:43.0
Pushed: 2018-02-19 01:00:28.0
Homepage: https://processhacker.sourceforge.io/
Size: 24869
Language: C
GitHub Committers
User | Most Recent Commit | # Commits |
---|
Other Committers
User | Most Recent Commit | # Commits |
---|
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
Windows 7 or higher, 32-bit or 64-bit.
Requires Visual Studio (2017 or later).
Execute build_release.cmd
located in the build
directory to compile the project or load the ProcessHacker.sln
and Plugins.sln
solutions if you prefer building the project using Visual Studio.
You can download the free Visual Studio Community Edition to build, run or develop Process Hacker.
You cannot run the 32-bit version of Process Hacker on a 64-bit system and expect it to work correctly, unlike other programs.
Please use the GitHub issue tracker for reporting problems or suggesting new features.
If you are running Process Hacker from a USB drive, you may want to save Process Hacker's settings there as well. To do this, create a blank file named “ProcessHacker.exe.settings.xml” in the same directory as ProcessHacker.exe. You can do this using Windows Explorer:
Plugins can be configured from Hacker > Plugins.
If you experience any crashes involving plugins, make sure they are up to date.
Disk and Network information provided by the ExtendedTools plugin is only available when running Process Hacker with administrative rights.
Process Hacker uses a kernel-mode driver, KProcessHacker, to assist with certain functionality. This includes:
Note that by default, KProcessHacker only allows connections from processes with administrative privileges (SeDebugPrivilege). To allow Process Hacker to show details for all processes when it is not running as administrator: