Posh-VirusTotal PowerShell V3.0 or higher module for interacting with the VirtusTotal service to analize suspicious files and URLs using either the Public or Private Version 2 API provided by VirusTotal. Cmdlets Available: Cmdlet Synopsis Get-PoshVTVersion Checks the version of the module installed versus the version on GitHub Get-VTAPIKeyInfo Get information on the Virus Total API key. Get-VTDomainReport Get a VirusTotal Report for a given Domain Get-VTFileBehaviourReport Get a report about the behavior of the file when executed in a sandboxed environment. Get-VTFileComment Retrieve a list of VirusTotal Community comments for a given file or URL Get-VTFileNetworkTraffic Get a dump of the network traffic generated by the file when executed. Get-VTFileReport Get a VirusTotal Report for a given File Get-VTFileSample Download a file by its hash. Get-VTFileScanReport Get the scan results for a file. Get-VTIPReport Get a VirusTotal Report for a given IPv4 Address Get-VTSpecialURL Get a special URL to upload files bigger than 32MB in size. Get-VTURLReport Get a VirusTotal Report for a given URL Remove-VTFileRescan Delete a previously scheduled scan. Search-VTAdvancedReversed Search for suspicious files and URLs.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
A sandbox for quickly sandboxing known or unknown families of Android Malware
A program to manage yara ruleset in a database with support for different databases and configuration options.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.