Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)
☆99Mar 16, 2021Updated 5 years ago
Alternatives and similar repositories for exchange_webshell_detection
Users that are interested in exchange_webshell_detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Logged PS Remote Command Wrapper for Blue Team Forensics/IR☆11Apr 12, 2018Updated 8 years ago
- A scanner to detect the use of stolen FireEye red team tools☆20Dec 18, 2020Updated 5 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Jan 31, 2022Updated 4 years ago
- ☆191Nov 19, 2025Updated 5 months ago
- Deletes old versions of OWA and ECP versions of Exchange Server☆12Dec 7, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆20Nov 7, 2024Updated last year
- Exploit and detect tools for CVE-2020-0688☆356Mar 21, 2020Updated 6 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- ☆22Oct 22, 2019Updated 6 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- AntSword 出网探测插件☆22Jul 6, 2022Updated 3 years ago
- Exchange Server support tools and scripts☆1,278Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Apr 18, 2019Updated 7 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Post exploitation tool for configuration management servers.☆77Jan 29, 2026Updated 3 months ago
- ☆71Feb 15, 2021Updated 5 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- 基于注册表劫持BypassUAC☆28Dec 16, 2020Updated 5 years ago
- ☆646Jun 6, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 6 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆270Mar 18, 2021Updated 5 years ago
- Dump stuff without touching disk☆165Oct 29, 2020Updated 5 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆42Apr 18, 2026Updated last week
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Nov 28, 2023Updated 2 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 3 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆256Oct 29, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- ☆28Mar 29, 2022Updated 4 years ago
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆168Sep 8, 2025Updated 7 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated 3 weeks ago