Lifka / WinProcessShotLinks
Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.
☆11Updated last year
Alternatives and similar repositories for WinProcessShot
Users that are interested in WinProcessShot are comparing it to the libraries listed below
Sorting:
- Ransomware for demonstration☆17Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive)…☆18Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- Enumeration & fingerprint tool☆25Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆25Updated 2 years ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- MalDev & AV-EDR Evasion for Pentesters☆15Updated 2 years ago
- Field guide to gather low-hanging fruits☆13Updated 3 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers☆24Updated 3 months ago
- ☆25Updated 7 months ago
- Collection of videos of Raids on Cybercriminals☆20Updated 3 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- URL fingerprinting made easy☆87Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Tactics, Techniques, and Procedures☆25Updated 5 months ago
- Script to perform some hashcracking logic automagically☆72Updated last year
- This repository contains a mindmap for different techniques for using Censys Search☆13Updated last year
- ☆14Updated 2 years ago
- RATs library 2003 to present☆14Updated last year
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year