A tool to recover from ESXiArgs ransomware
☆300Feb 10, 2023Updated 3 years ago
Alternatives and similar repositories for ESXiArgs-Recover
Users that are interested in ESXiArgs-Recover are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IP address filter by City☆12Jan 17, 2025Updated last year
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆27Jan 25, 2024Updated 2 years ago
- LPE exploit for CVE-2023-21768☆419Mar 8, 2023Updated 3 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆195Feb 24, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 9 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 2 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,212Feb 20, 2026Updated last month
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- ☆510Oct 7, 2024Updated last year
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆451Jun 16, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆42Oct 20, 2020Updated 5 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆867Jan 20, 2022Updated 4 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆945Updated this week
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,376Mar 9, 2026Updated last month
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year
- Powershell module for VMWare vSphere forensics☆173Nov 8, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,944Mar 26, 2026Updated 2 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆15Dec 29, 2025Updated 3 months ago
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated 2 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆181Jul 6, 2021Updated 4 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆952Feb 11, 2026Updated 2 months ago
- bad stuffs by bad guys☆49Jul 28, 2022Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,081Dec 11, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 9 months ago
- ☆159Nov 26, 2023Updated 2 years ago
- ☆615Jun 1, 2023Updated 2 years ago
- An advanced parser for INDX records☆29Aug 7, 2019Updated 6 years ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- ☆645Jun 6, 2023Updated 2 years ago
- POC for CVE-2022-39952☆265Feb 25, 2023Updated 3 years ago