Neo23x0 / vti-dorks
Awesome VirusTotal Intelligence Search Queries
☆332Updated last year
Alternatives and similar repositories for vti-dorks:
Users that are interested in vti-dorks are comparing it to the libraries listed below
- Collecting & Hunting for IOCs with gusto and style☆237Updated 3 years ago
- A tool designed to hunt for Phishing Kit source code☆220Updated last year
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- A phishing kit collector for scavengers☆198Updated 2 months ago
- Tool Analysis Result Sheet☆347Updated 7 years ago
- Scripts to analyze stuff☆146Updated 4 months ago
- Threat-Intelligence Feeds & Tools & Frameworks☆215Updated 9 months ago
- ☆116Updated last year
- Digital forensic acquisition tool for Windows based incident response.☆338Updated 10 months ago
- Collection of created MindMaps☆151Updated last year
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Valhalla API Client☆68Updated 2 years ago
- Threat Hunting tool about Sysmon and graphs☆330Updated last year
- Sigma rules from Joe Security☆207Updated 4 months ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆372Updated 2 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆198Updated 4 years ago
- ☆200Updated last year
- DFIRTrack - The Incident Response Tracking Application☆492Updated 6 months ago
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- ☆171Updated 9 months ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Test Blue Team detections without running any attack.☆272Updated 10 months ago
- Dump of organized knowledge on DFIR☆133Updated 3 years ago
- IOC from articles, tweets for archives☆313Updated last year
- Set of Yara rules for finding files using magics headers☆136Updated 4 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆241Updated 3 years ago
- Live forensic artifacts collector☆165Updated 8 months ago
- User guide of MISP☆266Updated 2 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆184Updated 2 years ago