Lifka / WinProcessShotLinks
Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.
☆12Updated last year
Alternatives and similar repositories for WinProcessShot
Users that are interested in WinProcessShot are comparing it to the libraries listed below
Sorting:
- A detailed list of potentially dangerous file extensions☆15Updated 5 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated last year
- MSIX Building Made Easy for Defenders☆59Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 4 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- Purple-team telemetry & simulation toolkit.☆46Updated last week
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- A user enumeration tool for Slack.☆32Updated last year
- ☆30Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- A not-curated list of cloud hacking labs☆27Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆89Updated 4 months ago
- Make an Linux Kernel rootkit visible again.☆60Updated 8 months ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆15Updated last year
- ☆55Updated 11 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- ☆14Updated 3 years ago
- Slides and videos from talks given at cons☆25Updated 5 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Detonate malware on VMs and get logs & detection status☆65Updated last week
- Repository for Ludus french templates☆20Updated last month
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆51Updated 2 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 2 months ago