Search this site
Embedded Files
Nick's IT Things
  • Home
  • Social engineering
    • Phishing
    • Phishing Attack Tutorial
    • Real Phishing Examples
  • The Dark Web
    • Dark Web Environment Setup
  • Windows Tips For Cyber Defence
    • Windows Hardening
  • Docker
    • Bug Bounty Toolkit
    • Pihole
    • Damn Vulnerable Web Application
    • Metasploitable2
  • YAML
  • Java
  • ASCII /table
  • SQL
  • Bash
    • grep
    • Git
  • StarLink
  • Hacking Tools
    • Arp poisoning with Kali to reverse shell
    • Malware Analysis
      • Malware Analysis tools
        • FakeNet
        • PeStudio
        • Process Hacker
        • ProcDot
        • Wireshark
    • Burpsuite
    • Cross-Site Scripting (XSS)
      • XSS Vulneability Scanner Tool's
      • XSS Payload List
    • Shodan
    • Bad USB Respberry Pi Pico
    • Bad USB Respberry Pi 0w
    • API hacking
  • ASCII Table
Nick's IT Things

ProcDOT

ProcDot allows a malware analyst to ingest the output from ProcMon and automatically generate a graphical representation of the captured data. Simply upload the csv into ProcDot and select the process name of the malware. Rather than creating filters and navigating hundreds of thousands of events you are now able to navigate a visual diagram of what recorded malware activity.

ProcMon data can also be enriched by ingesting a pcap from a tool such as Wireshark into ProcDot.



video by 13Cubed

Very good video!

TryHackME video using ProcDOT.


Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse