forensicxlab / VISION-ProcMon
A ProcessMonitor visualization application written in rust.
☆179Updated last year
Alternatives and similar repositories for VISION-ProcMon
Users that are interested in VISION-ProcMon are comparing it to the libraries listed below
Sorting:
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆239Updated last month
- Repository of Yara Rules☆110Updated last month
- ☆201Updated 6 months ago
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- ☆223Updated 3 months ago
- ☆247Updated last year
- Python tool to check rootkits in Windows kernel☆195Updated 2 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆162Updated last month
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆209Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆143Updated 9 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆177Updated this week
- A collection of tools and detections for the Sliver C2 Frameworj☆126Updated 2 years ago
- ☆299Updated 6 months ago
- Tools for analyzing EDR agents☆228Updated 11 months ago
- ☆136Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 3 months ago
- ☆187Updated last year
- Configuration Extractors for Malware☆104Updated 3 weeks ago
- A collection of tools, scripts and personal research☆128Updated last month
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆272Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆523Updated last year
- ☆114Updated last week
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆311Updated last year
- Active C&C Detector☆154Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 4 months ago
- Yara Rules for Modern Malware☆77Updated last year
- Cobalt Strike Beacon configuration extractor and parser.☆152Updated 3 years ago
- Extract C2 Traffic☆249Updated 5 months ago
- Analyse your malware to surgically obfuscate it☆467Updated 2 months ago