forensicxlab / VISION-ProcMonLinks
A ProcessMonitor visualization application written in rust.
☆183Updated 2 years ago
Alternatives and similar repositories for VISION-ProcMon
Users that are interested in VISION-ProcMon are comparing it to the libraries listed below
Sorting:
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆248Updated 5 months ago
- A C# based tool for analysing malicious OneNote documents☆116Updated 2 years ago
- ☆204Updated 10 months ago
- Repository of Yara Rules☆115Updated 5 months ago
- ☆253Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆173Updated 5 months ago
- Python tool to check rootkits in Windows kernel☆201Updated 3 weeks ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆195Updated this week
- ☆239Updated 3 months ago
- A collection of tools, scripts and personal research☆146Updated last month
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆207Updated last year
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆217Updated 2 years ago
- ☆136Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 7 months ago
- A collection of tools and detections for the Sliver C2 Frameworj☆129Updated 2 years ago
- Active C&C Detector☆156Updated last year
- Configuration Extractors for Malware☆113Updated 4 months ago
- ☆161Updated 2 years ago
- RegRipper4.0☆65Updated last month
- Powershell Linter☆83Updated last week
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆160Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 11 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- Yara Rules for Modern Malware☆79Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 8 months ago
- Dump quarantined files from Windows Defender☆67Updated 3 years ago
- ☆25Updated 3 years ago
- Initial triage of Windows Event logs☆102Updated last year