0
Endpoints Queried at Once
0
+ VQL Artifacts
Free
Open Source License

Forensic-Grade Endpoint Visibility

Velociraptor is built by incident responders, for incident responders. Query thousands of endpoints simultaneously. Collect forensic artifacts at scale.

Using VQL (Velociraptor Query Language), you can hunt for IOCs, collect evidence, and respond to incidents faster than any traditional EDR.

Get Velociraptor Managed
VQL> SELECT * FROM hunt(
  artifact="Windows.Detection.Yara.NTFS",
  yara_rules=IOC_Rules)
→ Hunting across 2,847 endpoints...
→ Results: 3 matches found
→ Hunt completed in 12 seconds ✓

Velociraptor Capabilities

🔍

Threat Hunting

Hunt for IOCs across thousands of endpoints simultaneously. YARA rules, Sigma rules, and custom VQL queries.

📦

Artifact Collection

Collect forensic artifacts at scale. Browser history, event logs, registry, prefetch, and hundreds more.

Live Response

Execute commands, collect files, and respond to threats in real-time across your entire fleet.

🔔

Real-time Monitoring

Deploy monitoring artifacts that alert on suspicious activity. Process execution, file changes, network connections.

📊

Timeline Analysis

Build timelines from collected artifacts. Super timeline generation for incident reconstruction.

🔗

SIEM Integration

Forward events to Wazuh, Elastic, or Splunk. Integrate with your existing security stack.

Ready for Better Endpoint Visibility?

See how Velociraptor can enhance your threat hunting

Get Velociraptor Quote