aboutsummaryrefslogtreecommitdiff
path: root/Recon
AgeCommit message (Collapse)AuthorFilesLines
2016-03-18Bug fix in Find-GPOLocationHarmj0y1-5/+9
2016-03-15Added Get-SiteName to find the site a computer is a part ofHarmj0y1-101/+288
Added -ComputerName parameter to Get-NetGPO to enumerate all GPOs a given computer has applied Fixed bug in Find-GPOComputerAdmin and added site enumeration for GPO links
2016-03-11Additional error checking in Get-DFSshareHarmj0y1-9/+10
2016-03-07Parse DFSv1 PKTMeatballs1-6/+198
2016-03-09Fixed bug with Get-NetGroupMember and computer accounts.Harmj0y1-33/+15
samaccounttype enumeration now more accurate.
2016-03-09fix for Find-GPOComputerAdminHarmj0y1-3/+15
2016-03-09Bug fix for Invoke-EnumerateLocalAdminHarmj0y1-5/+4
2016-03-09Removed Set-MacAttribute and Copy-ClonedFileHarmj0y2-234/+117
Combined Convert-NT4toCanonical and Convert-DomainSimpletoNT4 into Convert-ADName
2016-03-07Added New-GPOImmediateTaskHarmj0y1-12/+220
2016-03-07DomainOnly tweakHarmj0y1-5/+4
2016-03-07Added -DomainOnly flag to Invoke-EnumerateLocalAdminHarmj0y1-9/+23
2016-03-07renamed output field for Get-NetLocalGroup APIHarmj0y1-1/+1
2016-03-07Added NetLocalGroupGetMembers enumeration method for Get-NetLocalGroup with ↵Harmj0y1-151/+302
the -API flag Fixed threading specification in most threaded functions.
2016-03-06Added additional fields to Get-NetLocalGroup results.Harmj0y1-22/+63
2016-02-28Modified output of Find-GPOLocation to return more object information.Harmj0y1-26/+48
2016-02-28-fixed several bugs in Find-GPOLocation (-GroupName now works properly and ↵Harmj0y1-132/+147
Sites returned) -Find-GPOLocation with no arguments now returns all mappings -fixed parsing issue in Get-NetGPOGroup- names now properly extracted from restricted group templates
2016-02-11Most ldap-based search functions now accept a -Credential argument for ↵Harmj0y1-1084/+1427
querying from non-domain joined machines without a runas Changed several functions to filters, where appropriate. Get-NetShare, Get-NetSession, Get-NetLoggedOn, Get-NetRDPSession, Invoke-CheckLocalAdminAccess, Get-LastLoggedOn, Get-CachedRDPConnection, Get-NetProcess are now filters, better handle pipeline input, and now return an augmented result object with the queried ComputerName as a field Replaced RemoteUserName/RemotePassword with -Credential parameter in Get-CachedRDPConnection and Get-NetProcess modified output object for Get-NetShare to be a proper object Various bug fixes and better parameter validation
2015-12-29Added Find-ManagedSecurityGroups to readmeStuart Morgan1-0/+2
2015-12-29Sorted the recon.psd1 module import into alphabetical orderStuart Morgan1-51/+51
2015-12-29Added reference to function to powersploit.psd1 and recon.psd1Stuart Morgan1-0/+1
2015-12-28Added Find-ManagedSecurityGroupsStuart Morgan1-0/+71
2015-12-18Set all module versions to 3.0Matt Graeber1-58/+1
Also cleaned up some module manifest cruft.
2015-12-16Removed version numbers from scriptsMatt Graeber1-6/+0
A module should maintain a version number not the individual scripts.
2015-12-16Removed all version numbers from scriptsMatt Graeber1-4/+0
Scripts in a module should not be individually versioned. Only the module should be versioned.
2015-12-14Get-NetDomain now not called if -ComputerName or -ComputerFile are passed ↵Harmj0y1-108/+122
for meta functions, in order to prevent failure when running on a non-domain joined machine took out FQDN Pester tests from Recon.tests.ps1 that used $env:userdnsdomain
2015-12-11Added Invoke-DowngradeAccount to set an account to use reversible encryption.Harmj0y1-1/+117
2015-12-11Domain local group query fix.Harmj0y1-30/+140
Added ConvertFrom-UACValue to convert binary UAC values to human readable format. Corrected logic in Set-ADObject.
2015-12-03Integration of PowerView into ./Recon/Harmj0y4-16/+11260
2015-11-04Normalizing all files to ascii encodingMatt Graeber1-2/+2
2015-11-04Revert "Normalizing all files to ascii encoding"Matt Graeber1-0/+580
This reverts commit 5a812ce82361bf65443fc9c545c091e21e98fe80.
2015-11-04Normalizing all files to ascii encodingMatt Graeber1-580/+0
2014-04-28Fixing error in scriptclymb3r1-2/+0
2014-04-16Fixing formattingclymb3r2-1/+2
2014-04-16Fixing garbage put in by mergeclymb3r2-17/+0
2014-04-16Merge branch 'master' of https://github.com/mattifestation/PowerSploitclymb3r6-111/+153
Conflicts: Recon/Get-ComputerDetails.ps1 Recon/Recon.psd1
2014-03-16Adding internal recon/privesc privesc functions #40mattifestation2-1/+583
Added the following recon functions written by Joe Bialek (@JosephBialek): - Find-4648Logons - Find-4624Logons - Find-AppLockerLogs - Find-PSScriptsInPSAppLog - Find-RDPClientConnections - Get-ComputerDetails (Combines all of the above functions into a single function)
2014-03-02Separating out functions & bug fixclymb3r1-295/+438
All info gathering pieces of this script can now be called individually. Fixed a bug where the user SID wasn't being converted to a username in the RDP function.
2014-02-20Adding Get-ComputerDetails recon scriptclymb3r2-1/+439
Get-ComputerDetails is a recon script which pulls a variety of useful information off a computer which might later be useful by an attacker. This includes: Logons AppLocker process start logs PowerShell logs to find scripts run RDP Client saved servers
2014-01-30Merge pull request #26 from obscuresec/masterMatt Graeber1-105/+130
Update Invoke-ReverseDnsLookup.ps1
2014-01-30Update Invoke-ReverseDnsLookup.ps1Chris Campbell1-105/+130
Added pipeline support and verbose statement.
2013-11-13Normalized all scripts to ASCII encodingmattifestation4-7/+7
2013-11-03Fix for hostfiles option in powershell 2webstersprodigy1-2/+2
2013-10-22Fix for hostfiles option in powershell 2webstersprodigy1-2/+2
2013-07-06Merge branch 'Portscan' of https://github.com/webstersprodigy/PowerSploit ↵Matt Graeber2-2/+1090
into webstersprodigy-Portscan Conflicts: Recon/Recon.psd1
2013-07-03Updated Get-GPPPasswordMatt Graeber2-108/+2
2013-06-25IPv6 support in hosts paramRich Lundeen1-11/+14
2013-06-18fixing EOL spaces (again, sorry)Rich Lundeen1-3/+0
2013-06-18fixing EOL spacesRich Lundeen1-24/+13
2013-06-18Addressed mattifestation feedbackRich Lundeen1-235/+275
See https://github.com/mattifestation/PowerSploit/pull/6#issuecomment-19289063 1) I like this feedback a lot and took it. 2) I tried going thread only but it got messed up with very large scans. Eventually, I didn't think it was worth the amount of effort to make it reliable with only threads 3) Tried to do this 4) Did this 5) I like the idea in general and I took this one place (top-ports), but not for the two examples you gave. The reasoning is, I want people to be able to specify various options and arrays aren't that flexible. For example, I want people to specify a port list like "80,90,8080-8090". Similar with CIDR, since that's one option, but they could also be specifying hostnames e.g. "google.com,192.168.1.1/24,10.0.0.1"
2013-06-11small style updateRich Lundeen1-3/+3