Posh-VirusTotal PowerShell V3.0 or higher module for interacting with the VirtusTotal service to analize suspicious files and URLs using either the Public or Private Version 2 API provided by VirusTotal. Cmdlets Available: Cmdlet Synopsis Get-PoshVTVersion Checks the version of the module installed versus the version on GitHub Get-VTAPIKeyInfo Get information on the Virus Total API key. Get-VTDomainReport Get a VirusTotal Report for a given Domain Get-VTFileBehaviourReport Get a report about the behavior of the file when executed in a sandboxed environment. Get-VTFileComment Retrieve a list of VirusTotal Community comments for a given file or URL Get-VTFileNetworkTraffic Get a dump of the network traffic generated by the file when executed. Get-VTFileReport Get a VirusTotal Report for a given File Get-VTFileSample Download a file by its hash. Get-VTFileScanReport Get the scan results for a file. Get-VTIPReport Get a VirusTotal Report for a given IPv4 Address Get-VTSpecialURL Get a special URL to upload files bigger than 32MB in size. Get-VTURLReport Get a VirusTotal Report for a given URL Remove-VTFileRescan Delete a previously scheduled scan. Search-VTAdvancedReversed Search for suspicious files and URLs.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A sandbox for quickly sandboxing known or unknown families of Android Malware
A .NET assembly debugger and editor that enables reverse engineering and dynamic analysis of compiled .NET applications without source code access.
A collaborative malware analysis framework with various features for automated analysis tasks.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.