dafthack / HostReconLinks
This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance phase. It gathers information about the local system, users, and domain information. It does not use any 'net', 'ipconfig', 'whoami', 'netstat', or other system commands to help avoid detection.
☆456Updated 7 years ago
Alternatives and similar repositories for HostRecon
Users that are interested in HostRecon are comparing it to the libraries listed below
Sorting:
- Malicious WMI Events using PowerShell☆391Updated 9 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆557Updated 2 months ago
- Egress-Assess is a tool used to test egress data detection capabilities☆681Updated 2 years ago
- Credential and Red Teaming Defense for Windows Environments☆331Updated last year
- Domain Password Audit Tool for Pentesters☆986Updated last month
- A Powershell Privilege Escalation Enumeration Script.☆312Updated 7 years ago
- Search for categorized domain☆448Updated 6 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆842Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Updated 8 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆382Updated 5 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆366Updated last year
- ☆282Updated 7 years ago
- NetSPI PowerShell Scripts☆336Updated 7 months ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆197Updated last year
- Chameleon: A tool for evading Proxy categorisation☆506Updated 9 months ago
- ☆526Updated 3 years ago
- Active Directory forensic framework☆324Updated 3 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆398Updated last year
- An LDAP based Active Directory user and group enumeration tool☆307Updated 2 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆292Updated last year
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆450Updated 3 years ago
- Responder Windows Version Beta☆543Updated last year
- Search for potential frontable domains☆636Updated 2 years ago
- ☆395Updated last week
- The Old BloodHound C# Ingestor (Deprecated)☆510Updated 3 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆231Updated 7 years ago
- Weaponizing Splunk with reverse and bind shells.☆181Updated 8 years ago
- ☆400Updated 4 years ago
- Miscellaneous tools for BloodHound☆397Updated last year