THOR Scanner User Manual
Contents:
- 1. What is THOR?
- 2. Requirements
- 3. Before You Begin
- 4. Deployment
- 5. Scan
- 5.1. Quick Start
- 5.2. Often Used Parameters
- 5.3. Parameters possibly relevant for your Use Case
- 5.4. Risky Flags
- 5.5. Lesser Known But Useful Flags
- 5.6. Help and Debugging
- 5.7. Examples
- 5.8. Run a Scan with Specific Modules
- 5.9. Select or filter Signatures during Initialization
- 5.10. PE-Sieve Integration
- 5.11. Multi-Threading
- 6. Scan Modes
- 7. Special Scan Modes
- 8. Analysis
- 9. Configuration
- 10. Output Options
- 11. Update
- 12. Custom Signatures
- 13. Other Topics
- 14. Command Line Options
- 14.1. Scan Options
- 14.2. Scan Modes
- 14.3. Resource Options
- 14.4. Special Scan Modes
- 14.5. Thor Thunderstorm Service
- 14.6. License Retrieval
- 14.7. Active Modules
- 14.8. Module Extras
- 14.9. Active Features
- 14.10. Feature Extras
- 14.11. Output Options
- 14.12. ThorDB
- 14.13. Syslog
- 14.14. Reporting and Actions
- 14.15. THOR Remote
- 14.16. Automatic Collection of Suspicious Files (Bifrost)
- 14.17. VirusTotal Integration
- 14.18. Debugging and Info
- 15. Debugging
- 16. Analysis and Info
- 17. Use Cases
- 18. Known Issues
- 19. Links and References
- 20. Changelog