Lifka / WinProcessShot
Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.
☆10Updated 10 months ago
Alternatives and similar repositories for WinProcessShot
Users that are interested in WinProcessShot are comparing it to the libraries listed below
Sorting:
- Ransomware for demonstration☆15Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- A C# Tool to gather information about email breaches☆14Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Enumeration & fingerprint tool☆24Updated last year
- MalDev & AV-EDR Evasion for Pentesters☆15Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 10 months ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆24Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Tool for scanning domains for .git directories.☆16Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive)…☆18Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 5 months ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆30Updated 3 weeks ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆15Updated 6 months ago
- Tactics, Techniques, and Procedures☆25Updated 4 months ago
- Field guide to gather low-hanging fruits☆13Updated 2 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- ☆28Updated last year