Neo23x0 / vti-dorksLinks
Awesome VirusTotal Intelligence Search Queries
☆331Updated 2 years ago
Alternatives and similar repositories for vti-dorks
Users that are interested in vti-dorks are comparing it to the libraries listed below
Sorting:
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆222Updated last year
- ☆176Updated last year
- A tool designed to hunt for Phishing Kit source code☆229Updated 2 years ago
- ☆116Updated last year
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆240Updated 4 years ago
- Misc Threat Hunting Resources☆377Updated 3 years ago
- ☆215Updated 7 months ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- Personal compilation of APT malware from whitepaper releases, documents and own research☆267Updated 6 years ago
- Valhalla API Client☆70Updated last week
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆209Updated 5 years ago
- IOC from articles, tweets for archives☆319Updated 2 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 4 years ago
- Dump of organized knowledge on DFIR☆135Updated 4 years ago
- A phishing kit collector for scavengers☆220Updated last week
- Scripts to analyze stuff☆146Updated 6 months ago
- Digital forensic acquisition tool for Windows based incident response.☆346Updated last year
- Threat Hunting tool about Sysmon and graphs☆335Updated 2 years ago
- Ransomware leak site monitoring☆315Updated 3 years ago
- Mindmaps for threat hunting - work in progress.☆152Updated 3 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆387Updated 3 years ago
- Detecting ATT&CK techniques & tactics for Linux☆257Updated 5 years ago
- Test Blue Team detections without running any attack.☆272Updated last year
- Collection of created MindMaps☆151Updated 2 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Updated 4 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆180Updated last year
- Live forensic artifacts collector☆172Updated last year