PSRecon Logo

PSRecon

0
Free
Visit Website

PSRecon is a PowerShell-based incident response and live forensic data acquisition tool that gathers data from a remote Windows host, organizes the data into folders, hashes all extracted data, and sends the data to the security team. It also includes endpoint lockdown functionality, allowing users to disable an active directory account or quarantine the host until IT/Security can respond. The tool provides a detailed report that is self-contained, making it easy to share. It can be integrated with the organization's Active Defense frameworks to automate rapid forensic data acquisition and lock down the endpoint. PSRecon can be run on local or remote hosts, and offers various options for enabling PSRemoting and Unrestricted PowerShell Execution.

FEATURES

ALTERNATIVES

RegRippy is a modern Python 3 alternative to RegRipper for extracting data from Windows registry hives.

A repository containing material from a talk on sub-domain enumeration techniques

Windows event log fast forensics timeline generator and threat hunting tool.

A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.

ID-spoofing NFS client

An anti-forensic Linux Kernel Module kill-switch for USB ports.

Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.

No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.

PINNED