ProcFilter Logo

ProcFilter

0
Free
Visit Website

ProcFilter is a process filtering system for Windows with built-in YARA integration. YARA rules can be instrumented with custom meta tags that tailor its response to rule matches. It runs as a Windows service and is integrated with Microsoft's ETW API, making results viewable in the Windows Event Log. Installation, activation, and removal can be done dynamically and does not require a reboot. ProcFilter's intended use is for malware analysts to be able to create YARA signatures that protect their Windows environments against a specific threat. It does not include a large signature set. Think lightweight, precise, and targeted rather than broad or all-encompassing. ProcFilter is also intended for use in controlled analysis environments where custom plugins can perform artifact-specific actions. Designed to be easy to adopt, ProcFilter's integration with Git and Event Log minimize the need for additional tools or infrastructure to deploy rules or gather results. ProcFilter is compatible with Windows 7+ and Windows Server 2008+ systems. Installers ProcFilter x86/x64 Release/Debug Installers Note: Unpatched Windows 7 systems require hotfix 3033929 to load the driver component.

FEATURES

ALTERNATIVES

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

A list of most queried domains based on passive DNS usage across the Umbrella global network.

A project focusing on understanding and combating threats to the Internet economy and net citizens.

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

Repository of YARA rules for identifying and classifying malware.

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

A tool for extracting IOCs from various input sources and converting them into JSON format.

Modular Threat Hunting Tool & Framework

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved