<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>Process Stalker</title>
                            <pubDate>Thu, 05 Apr 2007 07:16:18 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/683/Process_Stalker</link>
                                        <author>Glich &lt;email-suppressed@example.com&gt;</author>
                                                    <description>I've just been watching the movie &lt;a href=&quot;http://www.archive.org/details/Pedram_Amini_PaiMei_and_the_Five_Finger_Exploding_Palm_RE_Techniques&quot;&gt;Pedram_Amini_PaiMei_and_the_Five_Finger_Exploding_Palm_RE_Techniques&lt;/a&gt;. It really brought to life how powerful Process Stalker is. It kinda reminded me of the tool called &lt;a href=&quot;http://www.cheatengine.org&quot;&gt;Cheat Engine&lt;/a&gt;. Cheat Engine basically scans all the memory of an app then scans again looking for a specific change. I want to learn Python now!</description>
                    </item>
            </channel>
</rss>
