forensicxlab / VISION-ProcMon
A ProcessMonitor visualization application written in rust.
☆177Updated last year
Alternatives and similar repositories for VISION-ProcMon:
Users that are interested in VISION-ProcMon are comparing it to the libraries listed below
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆236Updated this week
- A C# based tool for analysing malicious OneNote documents☆111Updated last year
- ☆200Updated 5 months ago
- A collection of tools, scripts and personal research☆127Updated 8 months ago
- Repository of Yara Rules☆103Updated last month
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆207Updated last year
- ☆236Updated 10 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆158Updated last month
- ☆134Updated last year
- A collection of tools and detections for the Sliver C2 Frameworj☆120Updated last year
- Python tool to check rootkits in Windows kernel☆195Updated last month
- ☆216Updated 2 months ago
- ☆158Updated last year
- Active C&C Detector☆153Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆121Updated 2 months ago
- ☆186Updated last year
- Configuration Extractors for Malware☆94Updated 2 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- The Windows Malware Analysis Reversing Core Tools☆92Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆171Updated last week
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆270Updated last year
- Yara Rules for Modern Malware☆75Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆141Updated 8 months ago
- Cobalt Strike Beacon configuration extractor and parser.☆153Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- ☆113Updated last month
- Initial triage of Windows Event logs☆97Updated 9 months ago
- ☆297Updated 5 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year