πŸ”
OffSec Wiki
search
⌘Ctrlk
πŸ”
OffSec Wiki
  • Tools
    • Nim Reverse Shell
    • Webcopilot
    • ReconFTW
    • ATOR
    • ClientChecker
    • Vulnx
    • ReconAlzer
    • Bbot
    • Automation Bug Hunting
    • Kali
    • Super XRay
    • BirdAdmin
    • SAST
    • WhoAmI
    • BurpSuite
    • Hashcat
    • Spray365
    • Log4j Scan
    • Bitvise
    • Linpeas
    • PimpMyKali
    • V3n0M - Scanner
    • Python-Sec-Tools
    • PowerSploit
    • OneX
    • Osmedeus
    • Omega DSToolkit
    • Vortex
    • Emp3r0r
    • Stratus
    • CryptoSteganography
    • Tyr
    • GO/Net
    • Dirhunt
    • SharpSQLPwn
    • KASM
    • CVE-2022-0995
    • Bettercap
    • Online Vuln Scanners
    • AutoRecon
    • Burp Extensions
    • Malware Samples
    • Arjun
    • GooFuzz
    • ReNgine
    • Fuxxsploider
    • AllHackingTools
    • HELK
    • Pretender - MITM
    • Spidex
    • Legion
    • F11snipe
    • DNS Shell
    • PS Recon
    • TheFatRat
    • Poiana
    • AppThreat - dep scan
    • Fruity WIFI
    • Chisel
    • PHP-Obfuscator
    • Hoaxshell
    • Veil
    • Ninjasploit
    • Egressbuster
    • IP LOGGER link
    • Rubeus
    • Reverse Shell Generator
    • PARTH
    • Psudohash
    • CredMaster
    • RedHat Security Scanner
  • Information Gathering
  • Exploitation
  • Cracking
  • Enumeration
  • API Sec
  • Web Pentesting
  • Linux
  • Wordpress
  • Post Exploitation
  • Persistence
  • Powershell
  • RED Teaming
  • Purple Teaming
  • Reverse Engineering
  • Pivoting
  • Metasploit
  • Networking
  • OSINT
  • Active Directory
  • Cloud
  • Containers
  • WIFI
  • Buffer Overflow
  • Code Review
  • Routers
  • Automotive CyberSec
  • Threat Modeling
  • Hardware & Lock Bypassing
  • Scripting
  • General PT Methodology
  • Blockchain
  • Challenges
  • Flipper
  • CERTS
  • Notes
  • Hacking Kubernetes
  • CV
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Tools

PS Recon

LogoGitHub - gfoss/PSRecon: :rocket: PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team. The data can be pushed to a share, sent over email, or retained locally.GitHubchevron-right
PreviousDNS Shellchevron-leftNextTheFatRatchevron-right

Last updated 3 years ago