PSRecon is a PowerShell-based incident response and live forensic data acquisition tool that gathers data from a remote Windows host, organizes the data into folders, hashes all extracted data, and sends the data to the security team. It also includes endpoint lockdown functionality, allowing users to disable an active directory account or quarantine the host until IT/Security can respond. The tool provides a detailed report that is self-contained, making it easy to share. It can be integrated with the organization's Active Defense frameworks to automate rapid forensic data acquisition and lock down the endpoint. PSRecon can be run on local or remote hosts, and offers various options for enabling PSRemoting and Unrestricted PowerShell Execution.
Common questions about PSRecon including features, pricing, alternatives, and user reviews.
PSRecon is A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts. It is a Security Operations solution designed to help security teams with Evidence Collection, Memory Forensics.
PSRecon is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/gfoss/PSRecon/ for download and installation instructions.
Popular alternatives to PSRecon include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
PSRecon is for security teams and organizations that need Evidence Collection, Memory Forensics. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.