gfoss / PSReconLinks
PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team. The data can be pushed to a share, sent over email, or retained locally.
☆487Updated 8 years ago
Alternatives and similar repositories for PSRecon
Users that are interested in PSRecon are comparing it to the libraries listed below
Sorting:
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆655Updated 5 years ago
- Powershell-based Windows Security Auditing Toolbox☆575Updated 6 years ago
- PowerShell - Rapid Response... For the incident responder in you!☆300Updated 5 years ago
- Currently not updated for WMIEvent module...☆261Updated 9 years ago
- PowerShell Module with Security cmdlets for security work☆447Updated 5 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆369Updated 6 years ago
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- ☆512Updated 4 years ago
- PowerShell Obfuscation Detection Framework☆740Updated last year
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,408Updated last year
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆464Updated 8 months ago
- A PowerShell Module Dedicated to Reverse Engineering☆878Updated 3 years ago
- ☆427Updated 2 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆739Updated 6 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆485Updated 4 years ago
- Powershell Threat Hunting Module☆284Updated 8 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Updated 8 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆384Updated last year
- Active Directory Control Paths auditing and graphing tools☆669Updated 4 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆405Updated 2 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆507Updated 3 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …