IOC Viewer
Extract · Visualize · Enrich · Export Indicators of Compromise
Script Input
How it works
Paste a PowerShell script or upload a .ps1 file to extract IOCs — IPs, domains, URLs, hashes, registry keys, C2 patterns, XOR payloads, and more. Then enrich with VirusTotal and export to JSON/CSV.
Drop .ps1 / .txt file or click to browse
Extracts
IPs & Domains
URLs & Staging
Hashes (MD5/SHA)
Emails
Registry Keys
File Paths
C2 Frameworks
Beacon Intervals
XOR Payloads
CVEs
Mutexes
VT Enrichment
Ready for IOC extraction
Paste a script or drop a file above, then click Extract IOCs to begin analysis.