Lifka / WinProcessShot
Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.
☆10Updated 9 months ago
Alternatives and similar repositories for WinProcessShot:
Users that are interested in WinProcessShot are comparing it to the libraries listed below
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆29Updated last month
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 4 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- Tool for scanning domains for .git directories.☆16Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- A C# Tool to gather information about email breaches☆14Updated last year
- MalDev & AV-EDR Evasion for Pentesters☆15Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆21Updated last year
- Field guide to gather low-hanging fruits☆13Updated last month
- Collection of videos of Raids on Cybercriminals☆19Updated last month
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆24Updated 2 years ago
- ☆9Updated 2 weeks ago
- self-hosted Azure OSINT tool☆30Updated 7 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A not-curated list of cloud hacking labs☆25Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Ransomware for demonstration☆15Updated 2 years ago
- ☆28Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 11 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 9 months ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated last month
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago