Velociraptor icon
Velociraptor icon

Velociraptor

Velociraptor is an advanced digital forensic and incident response tool that enhances your visibility into your endpoints.

Velociraptor screenshot 1

Cost / License

  • Free
  • Open Source

Platforms

  • Mac
  • Windows  Velociraptor is written in Golang and so is available for all the platforms supported by Go.
  • Linux
  • Self-Hosted
-
No reviews
0likes
0comments
0news articles

Features

Suggest and vote on features
  1.  Inventory Management

 Tags

  • Incident Response
  • digital-forensics
  • forensics-investigations
  • endpoint-protection
  • endpoint-discovery
  • endpoint-security

Velociraptor News & Activities

Highlights All activities

Recent activities

No activities found.

Velociraptor information

  • Developed by

    AU flagVelocidex
  • Licensing

    Open Source and Free product.
  • Written in

  • Alternatives

    3 alternatives listed
  • Supported Languages

    • English

AlternativeTo Category

Business & Commerce

GitHub repository

  •  3,658 Stars
  •  578 Forks
  •  74 Open Issues
  •   Updated  
View on GitHub
Velociraptor was added to AlternativeTo by sgnl05 on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

What is Velociraptor?

Velociraptor is a unique, advanced open-source endpoint monitoring, digital forensic and cyber response platform.

It was developed by Digital Forensic and Incident Response (DFIR) professionals who needed a powerful and efficient way to hunt for specific artifacts and monitor activities across fleets of endpoints. Velociraptor provides you with the ability to more effectively respond to a wide range of digital forensic and cyber incident response investigations and data breaches:

  • Reconstruct attacker activities through digital forensic analysis
  • Hunt for evidence of sophisticated adversaries
  • Investigate malware outbreaks and other suspicious network activities
  • Monitory continuously for suspicious user activities, such as files copied to USB devices
  • Discover whether disclosure of confidential information occurred outside the network
  • Gather endpoint data over time for use in threat hunting and future investigations

Official Links