cisagov / ESXiArgs-RecoverLinks
A tool to recover from ESXiArgs ransomware
☆299Updated 2 years ago
Alternatives and similar repositories for ESXiArgs-Recover
Users that are interested in ESXiArgs-Recover are comparing it to the libraries listed below
Sorting:
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆400Updated 2 months ago
- Map tracking ransomware, by OCD World Watch team☆469Updated 5 months ago
- Documentation and scripts to properly enable Windows event logs.☆624Updated last year
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆737Updated 4 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆269Updated last year
- ☆218Updated last year
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆590Updated 10 months ago
- CLI tools for forensic investigation of Windows artifacts☆344Updated 2 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆328Updated this week
- ☆529Updated last month
- Pwnspoof repository☆264Updated last year
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆783Updated 2 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆228Updated 9 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆231Updated this week
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆210Updated 3 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- Hardening Active Directory version 2☆333Updated 4 months ago
- This repo is about Active Directory Advanced Threat Hunting☆624Updated 5 months ago
- Linux Security and Monitoring Scripts☆324Updated 10 months ago
- Linux Security and Hardening Security Guide☆211Updated last year
- ☆160Updated 10 months ago
- BlueHound - pinpoint the security issues that actually matter☆742Updated 2 years ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆405Updated 10 months ago
- ☆798Updated last week
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆807Updated 5 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆414Updated 3 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 6 months ago
- Repo Filled With Follow Along Guides☆79Updated 3 years ago
- ☆52Updated 2 years ago