A ProcessMonitor visualization application written in rust.
☆184Aug 6, 2023Updated 2 years ago
Alternatives and similar repositories for VISION-ProcMon
Users that are interested in VISION-ProcMon are comparing it to the libraries listed below
Sorting:
- A centralized and enhanced memory analysis platform☆522Updated this week
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆701Oct 22, 2025Updated 5 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Jul 12, 2024Updated last year
- A curated list of ressources for Volatility 2 & 3☆13Mar 17, 2024Updated 2 years ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆56Jul 2, 2023Updated 2 years ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆42May 14, 2025Updated 10 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆779Feb 3, 2023Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- ☆25Jul 23, 2024Updated last year
- ☆25Jan 8, 2024Updated 2 years ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,062Feb 24, 2026Updated 3 weeks ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆23Sep 3, 2021Updated 4 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- Aims to identify sleeping beacons☆663Jan 25, 2026Updated last month
- Rapidly Search and Hunt through Linux Forensics Artifacts☆202Mar 9, 2026Updated last week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,576Oct 31, 2025Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated last year
- Load any Beacon Object File using Powershell!☆261Dec 9, 2021Updated 4 years ago
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 4 months ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- A Repository to Track Anti-Forensic Techniques☆119Mar 8, 2023Updated 3 years ago
- Analyse your malware to surgically obfuscate it☆524Dec 17, 2025Updated 3 months ago
- ☆31Dec 1, 2022Updated 3 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Aug 29, 2025Updated 6 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,173Mar 28, 2025Updated 11 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,476Mar 2, 2026Updated 2 weeks ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆791Mar 14, 2026Updated last week
- ☆23Oct 9, 2024Updated last year
- Collaborative Incident Response platform☆1,444Feb 16, 2026Updated last month
- A wireshark plugin to instrument ETW☆580Jan 28, 2022Updated 4 years ago
- ☆94May 14, 2022Updated 3 years ago
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago