Neo23x0 / vti-dorks
Awesome VirusTotal Intelligence Search Queries
☆329Updated last year
Related projects ⓘ
Alternatives and complementary repositories for vti-dorks
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- A phishing kit collector for scavengers☆190Updated this week
- A tool designed to hunt for Phishing Kit source code☆215Updated last year
- ☆190Updated last year
- Digital forensic acquisition tool for Windows based incident response.☆334Updated 6 months ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆363Updated 2 years ago
- Test Blue Team detections without running any attack.☆271Updated 6 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆255Updated 5 years ago
- Threat Hunting tool about Sysmon and graphs☆329Updated last year
- Tool Analysis Result Sheet☆345Updated 6 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆211Updated 5 months ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆193Updated 4 years ago
- Misc Threat Hunting Resources☆372Updated last year
- ☆115Updated 9 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆81Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆270Updated 2 months ago
- Mindmaps for threat hunting - work in progress.☆150Updated 2 years ago
- Set of Yara rules for finding files using magics headers☆135Updated 4 years ago
- Collection of created MindMaps☆151Updated last year
- Live forensic artifacts collector☆160Updated 4 months ago
- Scripts to analyze stuff☆144Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆144Updated last year
- DFIRTrack - The Incident Response Tracking Application☆482Updated 2 months ago
- A python script developed to process Windows memory images based on triage type.☆258Updated 11 months ago
- Automagically extract forensic timeline from volatile memory dump☆123Updated 6 months ago
- A modular OSINT honeypot for blue teamers☆329Updated last year
- Defanged Indicator of Compromise (IOC) Extractor.☆506Updated 2 months ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆443Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆92Updated 2 weeks ago
- Sigma rules from Joe Security☆203Updated 2 weeks ago