Copy-ReceiveConnector
Copy Exchange Server 2013+ receive connector settings to a different modern Exchange Server. (by Apoc70)
exchange_webshell_detection
Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065) (by cert-lv)
Copy-ReceiveConnector | exchange_webshell_detection | |
---|---|---|
1 | 8 | |
28 | 83 | |
- | - | |
0.0 | 4.4 | |
8 months ago | about 3 years ago | |
PowerShell | PowerShell | |
MIT License | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Copy-ReceiveConnector
Posts with mentions or reviews of Copy-ReceiveConnector.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Exchange 2010 Hybrid to Exchange 2016 Hybrid
Copy any additional Receive Connectors (relay, etc.).
exchange_webshell_detection
Posts with mentions or reviews of exchange_webshell_detection.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-03-05.
- CERT Latvia False Positive on their Detect Webshells Script
- CERT Latvia False Positiver on their Detect Webshells Script
- Windows defender quarantined Microsoft Exchange exploit attempt immediately & reset virtual oab directory. Am i still compromised?
- cert-lv/exchange_webshell_detection - Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)
-
HAFNIUM - Edited Files and File Left behind and other inquiries
Here's a script I found on bleepingcomputer that searches for several files. https://github.com/cert-lv/exchange_webshell_detection
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)
-
At Least 30k U.S. Organizations Newly Hacked via Holes in MS’s Email Software
There's a powershell script to check your server here: https://github.com/cert-lv/exchange_webshell_detection
What are some alternatives?
When comparing Copy-ReceiveConnector and exchange_webshell_detection you can also consider the following projects:
Get-ExchangeEnvironmentReport - This script creates an HTML report showing the following information about an Exchange 2019, 2016, 2013, 2010, and, to a lesser extent, 2007 and 2003 environment.
CSS-Exchange - Exchange Server support tools and scripts
PowerZure - PowerShell framework to assess Azure security
Cyber-Defence - Information released publicly by NCC Group's Cyber Incident Response Team
Encrypt-Delete-Test - Really can protect from ransomware encryption?