cisagov / ESXiArgs-Recover
A tool to recover from ESXiArgs ransomware
☆296Updated 2 years ago
Alternatives and similar repositories for ESXiArgs-Recover:
Users that are interested in ESXiArgs-Recover are comparing it to the libraries listed below
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Updated 2 years ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆254Updated last year
- Documentation and scripts to properly enable Windows event logs.☆603Updated last year
- This repo is about Active Directory Advanced Threat Hunting☆617Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆327Updated 5 months ago
- ☆704Updated 2 months ago
- Map tracking ransomware, by OCD World Watch team☆464Updated last month
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆395Updated 6 months ago
- ☆159Updated 6 months ago
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆786Updated 2 weeks ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆354Updated last week
- ☆209Updated 11 months ago
- Pwnspoof repository☆261Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆221Updated 6 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- PowerShell Digital Forensics & Incident Response Scripts.☆595Updated 3 weeks ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆488Updated 4 months ago
- SMBeagle - Fileshare auditing tool.☆712Updated 3 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆299Updated 8 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆146Updated last year
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆265Updated 2 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,030Updated 5 months ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆611Updated this week
- An open-source self-hosted purple team management web application.☆268Updated 3 weeks ago
- Linux Security and Hardening Security Guide☆211Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆316Updated 6 months ago
- Hardening Active Directory version 2☆315Updated last month
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated 2 months ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,083Updated this week
- ☆195Updated last year