Neo23x0 / vti-dorksLinks
Awesome VirusTotal Intelligence Search Queries
☆332Updated 2 years ago
Alternatives and similar repositories for vti-dorks
Users that are interested in vti-dorks are comparing it to the libraries listed below
Sorting:
- Misc Threat Hunting Resources☆373Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆217Updated 11 months ago
- Collection of created MindMaps☆150Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- ☆173Updated 11 months ago
- ☆116Updated last year
- A tool designed to hunt for Phishing Kit source code☆222Updated 2 years ago
- ☆201Updated last year
- Test Blue Team detections without running any attack.☆272Updated last year
- Digital forensic acquisition tool for Windows based incident response.☆341Updated last year
- Tool Analysis Result Sheet☆353Updated 7 years ago
- ☆283Updated 7 years ago
- A phishing kit collector for scavengers☆206Updated last month
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆375Updated 3 years ago
- Threat Hunting tool about Sysmon and graphs☆333Updated 2 years ago
- ☆302Updated 4 years ago
- Set of Yara rules for finding files using magics headers☆137Updated 4 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆201Updated 4 years ago
- DFIRTrack - The Incident Response Tracking Application☆498Updated 8 months ago
- A modular OSINT honeypot for blue teamers☆334Updated 2 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆352Updated 4 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- IOC from articles, tweets for archives☆313Updated last year
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆312Updated 3 weeks ago
- Automagically extract forensic timeline from volatile memory dump☆130Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆185Updated 3 years ago