A ProcessMonitor visualization application written in rust.
☆183Aug 6, 2023Updated 2 years ago
Alternatives and similar repositories for VISION-ProcMon
Users that are interested in VISION-ProcMon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A centralized and enhanced memory analysis platform☆524Mar 20, 2026Updated 2 months ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆715May 2, 2026Updated 3 weeks ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆126Jul 12, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A curated list of ressources for Volatility 2 & 3☆13Mar 17, 2024Updated 2 years ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆57Jul 2, 2023Updated 2 years ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆42May 14, 2025Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆777Feb 3, 2023Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- ☆25Jul 23, 2024Updated last year
- ☆25Jan 8, 2024Updated 2 years ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,169Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆23Sep 3, 2021Updated 4 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- Aims to identify sleeping beacons☆669Jan 25, 2026Updated 3 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆209Mar 9, 2026Updated 2 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,665May 3, 2026Updated 2 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- Load any Beacon Object File using Powershell!☆262Dec 9, 2021Updated 4 years ago
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 6 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- A Repository to Track Anti-Forensic Techniques☆119Mar 8, 2023Updated 3 years ago
- ☆31Dec 1, 2022Updated 3 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Analyse your malware to surgically obfuscate it☆530Dec 17, 2025Updated 5 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆173Aug 29, 2025Updated 8 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,261Mar 28, 2025Updated last year
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,548May 9, 2026Updated 2 weeks ago
- ☆23Oct 9, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆812May 15, 2026Updated last week
- A wireshark plugin to instrument ETW☆586Jan 28, 2022Updated 4 years ago
- Collaborative Incident Response platform☆1,491Apr 28, 2026Updated 3 weeks ago
- ☆94May 14, 2022Updated 4 years ago
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- High Octane Triage Analysis☆843May 14, 2026Updated last week