Marketplace ir-velociraptor
git clone https://github.com/aiskillstore/marketplace
T=$(mktemp -d) && git clone --depth=1 https://github.com/aiskillstore/marketplace "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/agentsecops/ir-velociraptor" ~/.claude/skills/aiskillstore-marketplace-ir-velociraptor && rm -rf "$T"
skills/agentsecops/ir-velociraptor/SKILL.mdVelociraptor Incident Response
Overview
Velociraptor is an endpoint visibility and forensics platform for collecting host-based state information using Velociraptor Query Language (VQL). It operates in three core modes: Collect (targeted evidence gathering), Monitor (continuous event capture), and Hunt (proactive threat hunting).
When to use this skill:
- Active incident response requiring endpoint evidence collection
- Threat hunting across enterprise infrastructure
- Digital forensics investigations and timeline analysis
- Endpoint monitoring and anomaly detection
- Custom forensic artifact development for specific threats
Quick Start
Local Forensic Triage (Standalone Mode)
# Download Velociraptor binary for your platform # https://github.com/Velocidex/velociraptor/releases # Run GUI mode for interactive investigation velociraptor gui # Access web interface at https://127.0.0.1:8889/ # Default admin credentials shown in console output
Enterprise Server Deployment
# Generate server configuration velociraptor config generate > server.config.yaml # Start server velociraptor --config server.config.yaml frontend # Generate client configuration velociraptor --config server.config.yaml config client > client.config.yaml # Deploy clients across endpoints velociraptor --config client.config.yaml client
Core Incident Response Workflows
Workflow 1: Initial Compromise Investigation
Progress: [ ] 1. Identify affected endpoints and timeframe [ ] 2. Collect authentication logs and suspicious logins [ ] 3. Gather process execution history and command lines [ ] 4. Extract network connection artifacts [ ] 5. Collect persistence mechanisms (scheduled tasks, autoruns, services) [ ] 6. Analyze file system modifications and suspicious files [ ] 7. Extract memory artifacts if needed [ ] 8. Build timeline and document IOCs
Work through each step systematically. Check off completed items.
Key VQL Artifacts:
- Remote desktop authentication eventsWindows.EventLogs.RDP
- Running processes with detailsWindows.System.Pslist
- Network connections with process contextWindows.Network.NetstatEnriched
- WMI-based persistenceWindows.Persistence.PermanentWMIEvents
- Program execution timelineWindows.Timeline.Prefetch
- Comprehensive filesystem timelineWindows.Forensics.Timeline
Workflow 2: Threat Hunting Campaign
Progress: [ ] 1. Define threat hypothesis and IOCs [ ] 2. Select or create custom VQL artifacts for detection [ ] 3. Create hunt targeting relevant endpoint groups [ ] 4. Execute hunt across infrastructure [ ] 5. Monitor collection progress and errors [ ] 6. Analyze results and identify positive matches [ ] 7. Triage findings and escalate confirmed threats [ ] 8. Document TTPs and update detections
Work through each step systematically. Check off completed items.
Common Hunt Scenarios:
- Lateral movement detection (PsExec, WMI, remote services)
- Webshell identification on web servers
- Suspicious scheduled task discovery
- Credential dumping tool artifacts
- Malicious PowerShell execution patterns
Workflow 3: Evidence Collection for Forensics
Progress: [ ] 1. Document collection requirements and scope [ ] 2. Create offline collector with required artifacts [ ] 3. Deploy collector to target endpoint(s) [ ] 4. Execute collection and verify completion [ ] 5. Retrieve collection archive [ ] 6. Validate evidence integrity (hashes) [ ] 7. Import into forensic platform for analysis [ ] 8. Document chain of custody
Work through each step systematically. Check off completed items.
# Create offline collector (no server required) velociraptor --config server.config.yaml artifacts collect \ Windows.KapeFiles.Targets \ Windows.EventLogs.Evtx \ Windows.Registry.Sysinternals.Eulacheck \ --output /path/to/collection.zip # For custom artifact collection velociraptor artifacts collect Custom.Artifact.Name --args param=value
VQL Query Patterns
Pattern 1: Process Investigation
Search for suspicious process execution patterns:
-- Find processes with unusual parent-child relationships SELECT Pid, Ppid, Name, CommandLine, Username, Exe FROM pslist() WHERE Name =~ "(?i)(powershell|cmd|wscript|cscript)" AND CommandLine =~ "(?i)(invoke|download|iex|bypass|hidden)"
Pattern 2: Network Connection Analysis
Identify suspicious network connections:
-- Active connections with process context SELECT Laddr.IP AS LocalIP, Laddr.Port AS LocalPort, Raddr.IP AS RemoteIP, Raddr.Port AS RemotePort, Status, Pid, process_tracker_get(id=Pid).Name AS ProcessName, process_tracker_get(id=Pid).CommandLine AS CommandLine FROM netstat() WHERE Status = "ESTABLISHED" AND Raddr.IP =~ "^(?!10\\.)" -- External IPs only
Pattern 3: File System Forensics
Timeline suspicious file modifications:
-- Recent file modifications in suspicious locations SELECT FullPath, Size, Mtime, Atime, Ctime, Btime FROM glob(globs="C:/Users/*/AppData/**/*.exe") WHERE Mtime > timestamp(epoch=now() - 86400) -- Last 24 hours ORDER BY Mtime DESC
Pattern 4: Registry Persistence
Hunt for registry-based persistence:
-- Common autorun registry keys SELECT Key.Name AS RegistryKey, ValueName, ValueData FROM read_reg_key(globs="HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Run/*") WHERE ValueData =~ "(?i)(powershell|cmd|wscript|rundll32)"
For comprehensive VQL patterns and advanced queries, see references/vql-patterns.md
Custom Artifact Development
Create custom VQL artifacts for specific investigation needs:
name: Custom.Windows.SuspiciousProcess description: | Detect processes with suspicious characteristics for incident response. parameters: - name: ProcessNameRegex default: "(?i)(powershell|cmd|wscript)" type: regex - name: CommandLineRegex default: "(?i)(invoke|download|bypass)" type: regex sources: - query: | SELECT Pid, Ppid, Name, CommandLine, Username, Exe, CreateTime FROM pslist() WHERE Name =~ ProcessNameRegex AND CommandLine =~ CommandLineRegex
Save artifacts in YAML format and import via Velociraptor UI or command line.
For artifact development guidance, see references/artifact-development.md
Security Considerations
-
Sensitive Data Handling: VQL queries can collect credentials, PII, and sensitive files. Implement data minimization - only collect necessary evidence. Use encryption for evidence transport and storage.
-
Access Control: Velociraptor server access provides significant endpoint control. Implement RBAC, audit all queries, and restrict administrative access. Use client certificates for authentication.
-
Audit Logging: All VQL queries, hunts, and collections are logged. Enable audit trail for compliance. Document investigation scope and approvals.
-
Compliance: Ensure evidence collection follows organizational policies and legal requirements. Document chain of custody for forensic investigations. Consider data sovereignty for multi-region deployments.
-
Operational Security: Velociraptor generates significant endpoint activity. Plan for network bandwidth, endpoint performance impact, and detection by adversaries during covert investigations.
Common Investigation Patterns
Pattern: Ransomware Investigation
- Identify patient zero endpoint
- Collect:
for file modification patternsWindows.Forensics.Timeline - Collect:
for authentication eventsWindows.EventLogs.Evtx - Hunt for: Lateral movement artifacts across network
- Hunt for: Scheduled tasks or services for persistence
- Extract: Ransomware binary samples for malware analysis
- Build: Timeline of infection spread and data encryption
Pattern: Data Exfiltration Detection
- Collect network connection history:
Windows.Network.NetstatEnriched - Identify large outbound transfers to unusual destinations
- Correlate with process execution and file access
- Hunt for: Compression tools or staging directories
- Examine: Browser downloads and cloud sync activities
- Review: DNS queries for tunneling or C2 domains
- Document: Data classification and breach scope
Pattern: Insider Threat Investigation
- Collect: User authentication and logon events
- Track: USB device connections and file transfers
- Monitor: Sensitive file access patterns
- Review: Email and browser history (with authorization)
- Analyze: Print spooler activity for document printing
- Examine: Cloud storage access and uploads
- Build: User activity timeline with behavioral anomalies
Integration Points
- SIEM Integration: Export VQL results to Splunk, Elastic, or other SIEM platforms for correlation
- Threat Intel Platforms: Enrich IOCs with TIP integrations via VQL plugins
- SOAR Platforms: Trigger automated Velociraptor hunts from SOAR playbooks
- Forensic Suites: Import Velociraptor collections into X-Ways, Autopsy, or EnCase
- EDR Interoperability: Complement EDR with custom VQL detections and forensic depth
Troubleshooting
Issue: High CPU Usage During Collection
Solution:
- Limit concurrent VQL queries using
functionrate() - Reduce glob scope to specific directories
- Use
limit when creating offline collectors--ops_per_second - Schedule resource-intensive hunts during maintenance windows
Issue: Client Not Reporting to Server
Solution:
- Verify network connectivity and firewall rules (default: TCP 8000)
- Check client logs:
velociraptor --config client.config.yaml logs - Validate client certificate and enrollment status
- Ensure server frontend is running and accessible
Issue: VQL Query Returns No Results
Solution:
- Test query in local notebook mode first
- Verify filesystem paths use correct syntax (forward slashes)
- Check plugin availability on target OS
- Use
function to debug query executionlog() - Review client event logs for permission errors
Bundled Resources
Scripts (scripts/
)
scripts/
- Generate common VQL queries from templatesvql_query_builder.py
- Validate custom artifact YAML syntaxartifact_validator.py
- Automate offline collector deploymentevidence_collector.sh
References (references/
)
references/
- Comprehensive VQL query patterns for common IR scenariosvql-patterns.md
- Guide to creating custom forensic artifactsartifact-development.md
- MITRE ATT&CK technique detection artifactsmitre-attack-mapping.md
- Enterprise server deployment and architecturedeployment-guide.md
Assets (assets/
)
assets/
- Template for custom artifact developmentartifact-template.yaml
- Hunt configuration template with best practiceshunt-template.yaml
- Offline collector configuration exampleoffline-collector-config.yaml