VENOMOUSVIPER LABS

1. Snapshot

Environment
Windows Endpoints (MSP/SMB)
Purpose
Structured IR Workflow
Tools/Tech
C# / .NET / Avalonia / PowerShell
Status
Active & Public on GitHub

2. Why I Built This

❌ The Problem with MSP "Incident Response"

Typical MSP incident response is reactive and incomplete:

  • Run AV/EDR remediation and hope it caught everything
  • Delete a few obvious malicious files
  • Mark ticket as resolved without checking for persistence
  • No consistent hardening after the incident
  • Limited documentation of what was actually done

ViperKit exists because Tier-1 and Tier-2 technicians need a clear, step-by-step IR playbook that:

Instead of stressed techs frantically Googling "how to remove malware", ViperKit walks them through a proven workflow: Hunt → Persist → Sweep → Cleanup → Hardening.

3. What ViperKit Does

ViperKit is a desktop IR toolkit with modules designed for real MSP incident workflows:

📋

Case Manager

Open a case per incident. Store notes, findings, and actions taken. Generate case summaries for documentation and client communication.

🔍

Hunt

Surface suspicious processes, services, network connections, and scheduled tasks. Identifies anomalies that warrant investigation.

🔗

Persist

Focus on persistence mechanisms: registry run keys, WMI, startup items, scheduled tasks, and service configurations. Often missed by automated tools.

🧹

Sweep / Cleanup

Clean temporary junk, leftover infection artifacts, and remnants from both malware and remediation tools.

🛡️

Hardening

Apply post-incident security tweaks: disable unnecessary services, configure Windows Defender properly, apply basic hardening so the machine is more secure than before the incident.

4. How It Works

Technical Architecture:

Recommended Workflow:

1. Open Case – Document incident details
2. Hunt – Identify suspicious activity
3. Investigate – Drill into findings
4. Persist Check – Remove persistence mechanisms
5. Sweep/Cleanup – Clean artifacts
6. Hardening – Apply security improvements
7. Document – Export case summary
8. Close Case – Mark incident resolved

The goal is to give stressed technicians a structured brain during an incident, ensuring nothing is missed and the system ends up more secure than it started.

5. Screenshots / Artifacts

ViperKit provides a complete incident response workflow: Hunt → Persist → Sweep → Cleanup → Harden. Built with .NET 9.0 and Avalonia UI, featuring case management, PowerShell history analysis, time clustering, quarantine with undo, security hardening profiles, and professional PDF reports.

6. Links

🔗 ViperKit GitHub Repository 📦 Latest Release 🐛 Report Issues / Request Features

ViperKit is actively developed and available as open source (.NET 9.0, Avalonia UI). Contributions, feedback, and feature requests are welcome via GitHub Issues.