Modern memory analysis, inspection and manipulation framework.
Inspectra is a professional toolset designed for low-level process introspection, memory scanning, pointer analysis, live patching and automation. It targets researchers, reverse engineers, QA engineers and developers who require a robust, extensible and production-quality memory analysis platform.
- Process Management: List, attach, and inspect running processes
- Memory Operations: Read, write, and query process memory with fine-grained control
- Advanced Scanning: Multi-threaded memory scanner with support for all data types
- Pattern Matching: AOB (Array of Bytes) scanning with wildcard support
- Pointer Analysis: Multi-level pointer chain discovery and resolution
- Code Patching: Runtime code modification, NOP patching, and shellcode injection
- Cross-Platform: Windows (full support), Linux (via /proc), macOS (limited)
- Python Bindings: Full Python API via PyO3
- Safe & Fast: Written in Rust for memory safety and performance
Add to your Cargo.toml:
[dependencies]
inspectra-core = "0.1.0"pip install inspectrause inspectra_core::*;
fn main() -> Result<()> {
init()?;
// List all processes
let manager = process::get_process_manager();
let processes = manager.list_processes()?;
// Find and attach to a process
let target = manager.find_by_name("target_app")?;
let handle = manager.attach(target[0].pid)?;
// Create memory accessor
let mem = memory::create_memory(&handle)?;
// Scan for a value
let mut scanner = scanner::Scanner::new(
mem,
scanner::ScanConfig::default()
);
let results = scanner.scan(&42i32.to_le_bytes())?;
println!("Found {} results", results.len());
Ok(())
}import inspectra
# Initialize
inspectra.init()
# List processes
manager = inspectra.ProcessManager()
processes = manager.list_processes()
for proc in processes:
print(f"{proc.pid}: {proc.name}")
# Find and scan
chrome = manager.find_by_name("chrome")
if chrome:
scanner = inspectra.Scanner(chrome[0].pid)
results = scanner.scan_i32(12345)
print(f"Found {len(results)} matches")- API Documentation: Complete API reference
- Architecture: System design and architecture
- Development Guide: Contributing and development workflow
- Roadmap: Future plans and features
inspectra/
βββ core/ # Rust core engine
β βββ src/ # Source code
β βββ examples/ # Usage examples
βββ bindings/
β βββ python/ # Python bindings
βββ tests/ # Integration tests
βββ docs/ # Documentation
βββ scripts/ # Build & utility scripts
- Rust 1.70+ (install from rustup.rs)
- Python 3.8+ (for bindings)
- Git
# Clone repository
git clone https://github.com/nodasys/inspectra.git
cd inspectra
# Build core
cargo build --release
# Run tests
cargo test
# Run examples
cargo run --example list_processes
# Build Python bindings
cd bindings/python
pip install maturin
maturin developcargo run --example list_processescargo run --example memory_scannercargo run --example pattern_scanpython bindings/python/examples/list_processes.py
python bindings/python/examples/memory_scanner.pyInspectra uses a modular architecture:
- Core Engine (Rust): High-performance memory operations
- Scripting Layer (Python/Lua): Automation and extensibility
- Platform Layer: OS-specific implementations
- UI Layer (Future): Cross-platform interface
See ARCHITECTURE.md for details.
- v0.1: Core engine, basic scanning β
- v0.2: Enhanced scanning with SIMD
- v0.3: Advanced pointer analysis
- v0.4: Full debugger integration
- v0.5: Scripting engine (Python/Lua)
- v0.6: GUI (Tauri-based)
- v1.0: Production-ready release
See ROADMAP.md for complete roadmap.
We welcome contributions! Please read our Contributing Guide for details on:
- Code style and standards
- Testing requirements
- Pull request process
- Security considerations
- Windows 10+ / Linux (kernel 3.10+) / macOS 10.15+
- Administrator/root privileges for memory operations
- Rust 1.70+
- Python 3.8+ (for bindings)
- CMake or Cargo
Inspectra is a powerful tool that requires elevated privileges. Use responsibly and only on systems you own or have permission to analyze.
- See SECURITY.md for security policy
- Report vulnerabilities privately to: [email protected]
This project is licensed under the MIT License - see LICENSE for details.
Inspectra is developed by Nodasys as a next-generation memory analysis framework.
- Repository: github.com/nodasys/inspectra
- Contact: [email protected]
- Website: https://nodasys.com
If you find Inspectra useful, please consider:
- β Starring the repository
- π Reporting bugs and issues
- π‘ Suggesting features
- π€ Contributing code
Disclaimer: This tool is for research, development, and authorized security testing only. Users are responsible for complying with applicable laws and regulations.
For private security reports and sensitive issues: [email protected]
For general issues, use GitHub Issues once the repository is public.
