ESXIe0x.sh is an automated forensic collection tool for VMware ESXi hosts. The script runs a series of commands to capture relevant system artifacts, enabling security event analysis. It is designed to be simple, structured, and effective in critical environments.
This tool is designed for incident response teams, forensic auditors, security analysts, and ESXi system administrators who need to collect technical evidence in a structured, fast, and accurate manner.
- Collection of ESXi operating system information.
- Hashing of binaries and executable files.
- Detailed information on virtual machines (VMs).
- System log collection.
- Network details and active connections.
- User, authentication, and session information.
- Active processes and advanced configuration.
- Generation of a summary file (
summary.txt) and a navigable HTML report.
- Root access or equivalent privileges on the ESXi host.
- ESXi system with shell access enabled.
Step 1: Copy the ESXIe0x.sh script to the /tmp/ directory of the target host.
Step 2: Grant execution permissions to the script:
chmod +x ./ESXIe0x.shStep 3: Run the script to start the collection and verify proper execution via console output:
./ESXIe0x.shStep 4: Download the resulting compressed file from the host (*.tar.gz).
Step 5: Remove the script from the host to avoid leaving traces:
rm ./ESXIe0x.shStep 6: Remove the compressed output file from the host (if already downloaded):
rm esxi_e0x_forensics_<hostname>_<date>.tar.gzOnce the .tar.gz results file has been downloaded and extracted, the ESXIe0x.sh script can generate a visual HTML report from the summary.txt file to facilitate analysis.
./ESXIe0x.sh -r /path/to/summary.txtThis will convert summary.txt into a cleanly styled and navigable summary.html.
Step 1: Run the following with privileges:
./ESXIe0x.sh -r /path/to/summary.txtThis will create a summary_ESXIe0x.html file with a navigable format, organized by sections (users, processes, network, etc.) and user-friendly visual design.
Step 2: View the summary_ESXIe0x.html file inside the folder.
- ESXi version, hostname, installation date, current time.
- System UUID, disk usage, hardware configuration (CPU, RAM, PCI devices).
- Storage devices and file systems.
- Complete directory tree (
find /). - MD5 hash of executable and key binary files (
/,/bin,/tmp).
- List of all active VMs.
- Status, configuration, and summary of each VM.
- Critical logs:
vmkernel.log,hostd.log,auth.log,shell.log, among others. - Syslog configuration.
- Local users and groups (
/etc/passwd,/etc/group,/etc/shadow). - Permissions, active sessions, and security policies.
- Running processes.
- Loaded system modules.
- Interfaces, active connections, firewalls, DNS, NICs, and network rules.
- Advanced system settings.
After full execution of the script:
- Packaged
.tar.gzfile ready for export:/tmp/esxi_e0x_forensics_<hostname>_<date>.tar.gz summary.txtfile with an overview of collected information.- Optional
summary.htmlfile for fast visual forensic analysis.
Developed by corvus0x with the goal of facilitating forensic analysis in VMware ESXi environments.
Contributions and improvements are welcome.


