Neo23x0 / vti-dorks
Awesome VirusTotal Intelligence Search Queries
☆331Updated last year
Alternatives and similar repositories for vti-dorks:
Users that are interested in vti-dorks are comparing it to the libraries listed below
- Collecting & Hunting for IOCs with gusto and style☆236Updated 3 years ago
- Misc Threat Hunting Resources☆372Updated last year
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆195Updated 4 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆213Updated 7 months ago
- ☆116Updated 11 months ago
- A tool designed to hunt for Phishing Kit source code☆217Updated last year
- Personal compilation of APT malware from whitepaper releases, documents and own research☆257Updated 5 years ago
- DFIRTrack - The Incident Response Tracking Application☆487Updated 4 months ago
- ☆170Updated 6 months ago
- IOC from articles, tweets for archives☆312Updated last year
- Collection of created MindMaps☆150Updated last year
- Set of Yara rules for finding files using magics headers☆134Updated 4 years ago
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- Threat Hunting tool about Sysmon and graphs☆329Updated last year
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆369Updated 2 years ago
- Tool Analysis Result Sheet☆345Updated 7 years ago
- Detection Ideas & Rules repository.☆178Updated 3 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆181Updated 2 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆288Updated 7 years ago
- Dump of organized knowledge on DFIR☆132Updated 3 years ago
- ☆197Updated last year
- Digital forensic acquisition tool for Windows based incident response.☆336Updated 8 months ago
- Sigma rules from Joe Security☆202Updated 2 months ago
- A VBA parser and emulation engine to analyze malicious macros.☆93Updated 2 months ago
- Mindmaps for threat hunting - work in progress.☆150Updated 2 years ago
- A phishing kit collector for scavengers☆196Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Test Blue Team detections without running any attack.☆271Updated 8 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆274Updated 4 months ago