dafthack / HostReconLinks
This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance phase. It gathers information about the local system, users, and domain information. It does not use any 'net', 'ipconfig', 'whoami', 'netstat', or other system commands to help avoid detection.
☆451Updated 7 years ago
Alternatives and similar repositories for HostRecon
Users that are interested in HostRecon are comparing it to the libraries listed below
Sorting:
- Malicious WMI Events using PowerShell☆387Updated 8 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆840Updated 7 years ago
- Credential and Red Teaming Defense for Windows Environments☆329Updated 11 months ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆554Updated 2 years ago
- NetSPI PowerShell Scripts☆333Updated 5 months ago
- ☆283Updated 7 years ago
- ☆523Updated 2 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆511Updated 3 years ago
- Domain Password Audit Tool for Pentesters☆972Updated 3 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆193Updated 11 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Updated 8 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆282Updated 10 months ago
- ☆390Updated last week
- Rapid Attack Infrastructure (RAI)☆305Updated 7 months ago
- Egress-Assess is a tool used to test egress data detection capabilities☆667Updated last year
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449Updated 3 years ago
- Chameleon: A tool for evading Proxy categorisation☆496Updated 6 months ago
- A PowerShell module to deploy active directory decoy objects.☆231Updated 5 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆379Updated 5 years ago
- Exchange privilege escalations to Active Directory☆771Updated 2 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆244Updated 8 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆380Updated 5 years ago
- Active Directory forensic framework☆326Updated 3 years ago
- Miscellaneous tools for BloodHound☆393Updated 11 months ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆227Updated 7 years ago
- Inject PowerShell into any process☆233Updated 6 years ago
- Disposable and resilient red team infrastructure with Terraform☆268Updated 6 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆489Updated 6 years ago
- An LDAP based Active Directory user and group enumeration tool☆308Updated 2 years ago