gfoss / PSRecon
PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team. The data can be pushed to a share, sent over email, or retained locally.
☆486Updated 7 years ago
Alternatives and similar repositories for PSRecon:
Users that are interested in PSRecon are comparing it to the libraries listed below
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆653Updated 5 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,400Updated last year
- Powershell-based Windows Security Auditing Toolbox☆577Updated 6 years ago
- PowerShell Module with Security cmdlets for security work☆442Updated 5 years ago
- PowerShell Obfuscation Detection Framework☆735Updated last year
- ☆507Updated 4 years ago
- A Powershell incident response framework☆1,601Updated 2 years ago
- Currently not updated for WMIEvent module...☆263Updated 9 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆870Updated 3 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆368Updated 6 years ago
- Powershell Threat Hunting Module☆283Updated 8 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆739Updated 6 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆457Updated 5 months ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆814Updated 10 months ago
- PowerShell - Rapid Response... For the incident responder in you!☆299Updated 5 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆801Updated last year
- ☆428Updated 2 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆917Updated last year
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Updated 7 years ago
- PowerShell Scripts I find useful☆753Updated 8 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆866Updated 4 years ago
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆479Updated 4 years ago
- Not PowerShell☆446Updated 8 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆801Updated 5 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆384Updated 10 months ago
- Digital forensic acquisition tool for Windows based incident response.☆339Updated last year
- Powershell C2 Server and Implants☆573Updated 5 years ago
- Active Directory Control Paths auditing and graphing tools☆663Updated 4 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆199Updated 8 years ago