Overview:
This tool is a lightweight, high-performance command-line interface (CLI) monitoring application, written in pure C. It requires no command-line arguments, flags, or complex commands. Simply run the executable (either by double-clicking it or launching it normally), and the tool will automatically display a numbered list of all currently running processes.
To select a process, enter the corresponding number and press Enter. The tool will then scan the selected process every two seconds for one minute and save all results into a file named ScanResults.log.
Information Provided:
The following information will be collected for the selected process:
RAM usage
CPU usage
Disk I/O statistics
Thread information
Usage Instructions:
Upon launching, the tool scans all currently running processes and enumerates them with their name (which may appear as "unknown") and their respective PID (Process ID).
To select a process, choose its PID from the enumeration. For instance, if you wish to monitor the process with PID 2523, you may see an entry like 138 (PID 2523). In this case, type 138 and press Enter.
If you are unsure of the PID of the process you want to monitor, press Ctrl+Shift+Esc or Ctrl+Alt+Del to open the Task Manager. From there, you can locate the PID of the desired process.
Permissions:
If the program fails to retrieve some or all of the information, it is likely due to insufficient privileges for accessing the required process data.
Log File Handling:
The tool writes all gathered data to the same file, ScanResults.log. Upon the next scan, the file is cleared and overwritten with the new data. If you wish to retain the current data for further analysis, rename the log file before running the next scan (for example, from ScanResults.log to MyProjectScanResults.log) to prevent it from being overwritten.
Important: Do not open the log file while the scan is in progress to avoid potential issues with writing data.
Encryption and Transmission:
After the scan is completed, the program encrypts the log file using the XChaChaPoly1305 encryption algorithm. The encrypted file is then transmitted via TCP to another server or PC (depending on your specific setup) for analysis. The results will be returned in a small buffer.