Lifka / WinProcessShotLinks
Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.
☆12Updated last year
Alternatives and similar repositories for WinProcessShot
Users that are interested in WinProcessShot are comparing it to the libraries listed below
Sorting:
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆60Updated 9 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- ☆55Updated last year
- Creating a ransomware in a minute☆30Updated 2 years ago
- A not-curated list of cloud hacking labs☆27Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated 2 years ago
- A detailed list of potentially dangerous file extensions☆16Updated 5 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆18Updated 6 months ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 11 months ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- Detonate malware on VMs and get logs & detection status☆72Updated last week
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- ☆31Updated 2 years ago
- ☆31Updated 2 years ago
- MSIX Building Made Easy for Defenders☆59Updated 3 months ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆15Updated last year
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago
- ☆14Updated 3 years ago
- A python based Bot Net Framework☆43Updated 4 months ago
- A user enumeration tool for Slack.☆34Updated last year
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 3 months ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ☆11Updated last year