fastfire / IoC_Attack_ESXi_Feb_2023
Collection of IoCs available and related to attacks on ESXi infrastructures that occurred as of Friday February 3, 2023.
☆12Updated last year
Alternatives and similar repositories for IoC_Attack_ESXi_Feb_2023:
Users that are interested in IoC_Attack_ESXi_Feb_2023 are comparing it to the libraries listed below
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Can you pay the ransom in your country?☆13Updated last year
- Open YARA scan- and search engine☆20Updated 3 weeks ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Indicators of Normality☆12Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆14Updated 4 years ago
- Hashes of infamous malware☆25Updated last year
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- Linux #rootkit and #malware revealer☆21Updated 5 months ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 10 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆10Updated 2 weeks ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆19Updated last month
- ☆27Updated last week
- ☆42Updated 2 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆18Updated 3 months ago
- ☆22Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- ESXi Cyber Security Incident Response Script☆22Updated 4 months ago
- Continuous kerberoast monitor☆44Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- Parser for Windows PowerShell script block logs☆13Updated 2 weeks ago