A ProcessMonitor visualization application written in rust.
☆184Aug 6, 2023Updated 2 years ago
Alternatives and similar repositories for VISION-ProcMon
Users that are interested in VISION-ProcMon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A centralized and enhanced memory analysis platform☆524Mar 20, 2026Updated 3 weeks ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆702Oct 22, 2025Updated 5 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Jul 12, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A curated list of ressources for Volatility 2 & 3☆13Mar 17, 2024Updated 2 years ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆57Jul 2, 2023Updated 2 years ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆42May 14, 2025Updated 10 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆779Feb 3, 2023Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- ☆25Jul 23, 2024Updated last year
- ☆25Jan 8, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,106Mar 21, 2026Updated 3 weeks ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆23Sep 3, 2021Updated 4 years ago
- Aims to identify sleeping beacons☆664Jan 25, 2026Updated 2 months ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- Rapidly Search and Hunt through Linux Forensics Artifacts☆202Mar 9, 2026Updated last month
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,606Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- Load any Beacon Object File using Powershell!☆262Dec 9, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 5 months ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- A Repository to Track Anti-Forensic Techniques☆119Mar 8, 2023Updated 3 years ago
- ☆31Dec 1, 2022Updated 3 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 3 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆172Aug 29, 2025Updated 7 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,497Apr 1, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A wireshark plugin to instrument ETW☆582Jan 28, 2022Updated 4 years ago
- ☆23Oct 9, 2024Updated last year
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆801Updated this week
- Collaborative Incident Response platform☆1,458Feb 16, 2026Updated last month
- ☆94May 14, 2022Updated 3 years ago
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago