Skip to content

Process

Domain: process

Process, module, memory diagnostics, and controlled injection domain for host-level inspection, troubleshooting, and Windows process experimentation workflows.

Profiles

  • full

Typical scenarios

  • Enumerate processes and inspect modules
  • Diagnose memory failures and export audit trails
  • Perform controlled DLL/shellcode injection in opt-in environments

Common combinations

  • process + debugger
  • process + platform

Representative tools

  • electron_attach — Connect to a running Electron app (VS Code, Cursor, etc.) via CDP and inspect/execute JS. Useful for debugging Electron applications or extracting extension data.
  • process_find — Find processes by name pattern. Returns process IDs, names, paths, and window handles.
  • process_list — List all running processes. Alias of process_find with empty pattern.
  • process_get — Get detailed information about a specific process by PID.
  • process_windows — Get all window handles for a process.
  • process_find_chromium — Disabled by design: does not scan user-installed browser processes. Use managed browser sessions (browser_launch/browser_attach with explicit endpoint) instead.
  • process_check_debug_port — Check if a process has a debug port enabled for CDP attachment.
  • process_launch_debug — Launch an executable with remote debugging port enabled.
  • process_kill — Kill a process by PID.
  • memory_read — Read memory from a process at a specific address. Failures include structured diagnostics for permissions, region checks, and ASLR guidance.

Full tool list (26)

ToolDescription
electron_attachConnect to a running Electron app (VS Code, Cursor, etc.) via CDP and inspect/execute JS. Useful for debugging Electron applications or extracting extension data.
process_findFind processes by name pattern. Returns process IDs, names, paths, and window handles.
process_listList all running processes. Alias of process_find with empty pattern.
process_getGet detailed information about a specific process by PID.
process_windowsGet all window handles for a process.
process_find_chromiumDisabled by design: does not scan user-installed browser processes. Use managed browser sessions (browser_launch/browser_attach with explicit endpoint) instead.
process_check_debug_portCheck if a process has a debug port enabled for CDP attachment.
process_launch_debugLaunch an executable with remote debugging port enabled.
process_killKill a process by PID.
memory_readRead memory from a process at a specific address. Failures include structured diagnostics for permissions, region checks, and ASLR guidance.
memory_writeWrite data to process memory at a specific address. Failures include structured diagnostics for permissions, region checks, and ASLR guidance.
memory_scanScan process memory for a pattern or value. Failures include structured diagnostics for permissions, region checks, and ASLR guidance.
memory_check_protectionCheck memory protection flags at a specific address. Detects if memory is writable/readable/executable.
memory_protectAlias of memory_check_protection. Check memory protection flags at a specific address.
memory_scan_filteredScan memory within a filtered set of addresses (secondary scan). Useful for narrowing down results.
memory_batch_writeWrite multiple memory patches at once. Useful for applying cheats or modifications.
memory_dump_regionDump a memory region to a file for analysis.
memory_list_regionsList all memory regions in a process with protection flags.
memory_audit_exportExport the in-memory audit trail for memory operations as JSON. Supports clear=true to flush the buffer after export.
inject_dllInject a DLL into a target process using CreateRemoteThread + LoadLibraryA. Enabled by default on Windows; set ENABLE_INJECTION_TOOLS=false to disable. Requires administrator privileges.
module_inject_dllAlias of inject_dll. Enabled by default on Windows; set ENABLE_INJECTION_TOOLS=false to disable.
inject_shellcodeInject and execute shellcode in a target process. Accepts hex or base64. Enabled by default on Windows; set ENABLE_INJECTION_TOOLS=false to disable.
module_inject_shellcodeAlias of inject_shellcode. Enabled by default on Windows; set ENABLE_INJECTION_TOOLS=false to disable.
check_debug_portCheck if a process is being debugged using NtQueryInformationProcess (ProcessDebugPort).
enumerate_modulesList all loaded modules (DLLs) in a process with their base addresses.
module_listAlias of enumerate_modules. List loaded modules (DLLs) in a process.

Released under AGPL-3.0-only