ir-velociraptor
Collect endpoint evidence with Velociraptor VQL
Conduct forensic investigations and threat hunting across enterprise endpoints. Use VQL queries to collect process artifacts, network connections, registry data, and event logs for incident analysis and compromise detection.
Download the skill ZIP
Upload in Claude
Go to Settings → Capabilities → Skills → Upload skill
Toggle on and start using
Test it
Using "ir-velociraptor". Find processes with suspicious parent-child relationships indicating potential injection
Expected outcome:
- Processes spawned by Office applications running PowerShell or cmd.exe
- Processes from AppData/Temp directories with hidden or bypass flags
- LOLBin abuse (certutil, bitsadmin, mshta) for code execution
- Memory regions with RWX protections in non-JIT processes
Using "ir-velociraptor". Hunt for persistence mechanisms used by attackers
Expected outcome:
- Scheduled tasks with suspicious PowerShell command lines
- Registry run keys modified in the last 7 days
- WMI event subscriptions for persistent execution
- Startup folder executables with unknown publishers
Using "ir-velociraptor". Detect lateral movement activity in the network
Expected outcome:
- Process executions originating from remote IP addresses
- Authentication events from unusual source locations
- SMB shares accessed during off-hours
- RDP connections from non-standard endpoints
Security Audit
SafePure documentation skill containing only markdown reference files and YAML templates for the legitimate open-source Velociraptor DFIR platform. All patterns detected are false positives: VQL queries (not shell commands), detection patterns (not C2 code), forensic artifacts (not credential theft), and documentation links. This is incident response documentation for security professionals.
Risk Factors
🌐 Network access (56)
⚙️ External commands (427)
📁 Filesystem access (3)
🔑 Env variables (29)
⚡ Contains scripts (2)
Quality Score
What You Can Build
Investigate security breaches
Collect and analyze forensic evidence to determine scope and root cause of security incidents
Proactively hunt for threats
Deploy organization-wide hunts to detect suspicious process execution and persistence mechanisms
Build forensic artifacts
Create custom VQL artifacts tailored to specific threat scenarios and detection requirements
Try These Prompts
Write a VQL query to find processes running from temp directories with obfuscated command lines
Show me the VQL to hunt for suspicious registry run keys and startup locations
What VQL queries detect PowerShell execution techniques mapped to ATT&CK T1059.001
Create a custom Velociraptor artifact YAML that collects recent executables with SHA256 hashes
Best Practices
- Use preconditions to verify OS compatibility before artifact execution
- Implement rate limiting and CPU limits to prevent endpoint performance impact
- Document chain of custody and investigation scope for compliance
Avoid
- Running filesystem glob queries without time or size limits
- Collecting all artifacts without defining specific investigation scope
- Storing collected evidence without encryption or access controls
Frequently Asked Questions
What platforms does Velociraptor support?
How many endpoints can Velociraptor manage?
Can Velociraptor work offline?
Is collected data encrypted?
Why are queries returning no results?
How does this compare to commercial EDR?
Developer Details
Author
AgentSecOpsLicense
MIT
Repository
https://github.com/AgentSecOps/SecOpsAgentKit/tree/main/skills/incident-response/ir-velociraptorRef
main
File structure