processhacker/processhacker

Name: processhacker

Owner: Process Hacker

Description: A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.

Created: 2016-02-01 08:10:21.0

Updated: 2018-02-20 11:47:43.0

Pushed: 2018-02-19 01:00:28.0

Homepage: https://processhacker.sourceforge.io/

Size: 24869

Language: C

GitHub Committers

UserMost Recent Commit# Commits

Other Committers

UserEmailMost Recent Commit# Commits

README

Process Hacker

A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.

Build status Licence

Logo

System requirements

Windows 7 or higher, 32-bit or 64-bit.

Features
Building the project

Requires Visual Studio (2017 or later).

Execute build_release.cmd located in the build directory to compile the project or load the ProcessHacker.sln and Plugins.sln solutions if you prefer building the project using Visual Studio.

You can download the free Visual Studio Community Edition to build, run or develop Process Hacker.

Additional information

You cannot run the 32-bit version of Process Hacker on a 64-bit system and expect it to work correctly, unlike other programs.

Enhancements/Bugs

Please use the GitHub issue tracker for reporting problems or suggesting new features.

Settings

If you are running Process Hacker from a USB drive, you may want to save Process Hacker's settings there as well. To do this, create a blank file named “ProcessHacker.exe.settings.xml” in the same directory as ProcessHacker.exe. You can do this using Windows Explorer:

  1. Make sure “Hide extensions for known file types” is unticked in Tools > Folder options > View.
  2. Right-click in the folder and choose New > Text Document.
  3. Rename the file to ProcessHacker.exe.settings.xml (delete the “.txt” extension).
Plugins

Plugins can be configured from Hacker > Plugins.

If you experience any crashes involving plugins, make sure they are up to date.

Disk and Network information provided by the ExtendedTools plugin is only available when running Process Hacker with administrative rights.

KProcessHacker

Process Hacker uses a kernel-mode driver, KProcessHacker, to assist with certain functionality. This includes:

Note that by default, KProcessHacker only allows connections from processes with administrative privileges (SeDebugPrivilege). To allow Process Hacker to show details for all processes when it is not running as administrator:

  1. In Registry Editor, navigate to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\KProcessHacker3
  2. Under this key, create a key named Parameters if it does not exist.
  3. Create a DWORD value named SecurityLevel and set it to 2. If you are not using an official build, you may need to set it to 0 instead.
  4. Restart the KProcessHacker3 service (sc stop KProcessHacker3, sc start KProcessHacker3).

This work is supported by the National Institutes of Health's National Center for Advancing Translational Sciences, Grant Number U24TR002306. This work is solely the responsibility of the creators and does not necessarily represent the official views of the National Institutes of Health.