Lifka / WinProcessShot
Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.
☆10Updated 9 months ago
Alternatives and similar repositories for WinProcessShot:
Users that are interested in WinProcessShot are comparing it to the libraries listed below
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆24Updated this week
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆13Updated 2 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- Offensive Assembly code snippets.☆12Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 8 months ago
- Slides and videos from talks given at cons☆13Updated 8 months ago
- Identifies metadata of .NET binary files.☆21Updated 11 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆20Updated last week
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Deobfuscation of XorStringsNet☆12Updated 4 months ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆18Updated this week
- UAC Bypass using CMSTP in Rust☆25Updated 3 months ago
- A user enumeration tool for Slack.☆26Updated 9 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 3 years ago
- Mythic Developer Series: Workshop Golang Agent☆24Updated last year
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆11Updated last month
- CSharp4Pentesters☆12Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- MalDev & AV-EDR Evasion for Pentesters☆14Updated 2 years ago
- ☆12Updated last year
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆14Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 4 months ago
- ☆19Updated 4 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year
- ☆22Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago