Windows process denial framework with YARA integration
Top 74.0% on sourcepulse
ProcFilter is a Windows service that integrates YARA rules to filter processes, offering targeted protection and analysis capabilities for malware analysts and security professionals. It allows dynamic blocking, logging, or quarantining of processes based on custom YARA signatures, enhancing endpoint security and threat intelligence gathering without requiring reboots.
How It Works
ProcFilter leverages Microsoft's Event Tracing for Windows (ETW) API to monitor process and thread events. It scans process memory and files against YARA rules, which can be dynamically updated via Git. Custom meta tags within YARA rules dictate actions like blocking, logging, or quarantining, providing granular control and extensibility through a C API for custom plugins.
Quick Start & Requirements
procfilter.ini
for scanning options and Git repository URLs for rule updates.Highlighted Details
Maintenance & Community
Licensing & Compatibility
Limitations & Caveats
ProcFilter is described as beta and not yet ready for production environments. Its signature-based approach means it relies on previously identified threats and can be evaded by signature mutation. While extensible, it is not an AV replacement and has a minimal default signature set.
5 years ago
Inactive