aboutsummaryrefslogtreecommitdiff
path: root/Recon
AgeCommit message (Collapse)AuthorFilesLines
2015-12-18Set all module versions to 3.0Matt Graeber1-58/+1
Also cleaned up some module manifest cruft.
2015-12-16Removed version numbers from scriptsMatt Graeber1-6/+0
A module should maintain a version number not the individual scripts.
2015-12-16Removed all version numbers from scriptsMatt Graeber1-4/+0
Scripts in a module should not be individually versioned. Only the module should be versioned.
2015-12-14Get-NetDomain now not called if -ComputerName or -ComputerFile are passed ↵Harmj0y1-108/+122
for meta functions, in order to prevent failure when running on a non-domain joined machine took out FQDN Pester tests from Recon.tests.ps1 that used $env:userdnsdomain
2015-12-11Added Invoke-DowngradeAccount to set an account to use reversible encryption.Harmj0y1-1/+117
2015-12-11Domain local group query fix.Harmj0y1-30/+140
Added ConvertFrom-UACValue to convert binary UAC values to human readable format. Corrected logic in Set-ADObject.
2015-12-03Integration of PowerView into ./Recon/Harmj0y4-16/+11260
2015-11-04Normalizing all files to ascii encodingMatt Graeber1-2/+2
2015-11-04Revert "Normalizing all files to ascii encoding"Matt Graeber1-0/+580
This reverts commit 5a812ce82361bf65443fc9c545c091e21e98fe80.
2015-11-04Normalizing all files to ascii encodingMatt Graeber1-580/+0
2014-04-28Fixing error in scriptclymb3r1-2/+0
2014-04-16Fixing formattingclymb3r2-1/+2
2014-04-16Fixing garbage put in by mergeclymb3r2-17/+0
2014-04-16Merge branch 'master' of https://github.com/mattifestation/PowerSploitclymb3r6-111/+153
Conflicts: Recon/Get-ComputerDetails.ps1 Recon/Recon.psd1
2014-03-16Adding internal recon/privesc privesc functions #40mattifestation2-1/+583
Added the following recon functions written by Joe Bialek (@JosephBialek): - Find-4648Logons - Find-4624Logons - Find-AppLockerLogs - Find-PSScriptsInPSAppLog - Find-RDPClientConnections - Get-ComputerDetails (Combines all of the above functions into a single function)
2014-03-02Separating out functions & bug fixclymb3r1-295/+438
All info gathering pieces of this script can now be called individually. Fixed a bug where the user SID wasn't being converted to a username in the RDP function.
2014-02-20Adding Get-ComputerDetails recon scriptclymb3r2-1/+439
Get-ComputerDetails is a recon script which pulls a variety of useful information off a computer which might later be useful by an attacker. This includes: Logons AppLocker process start logs PowerShell logs to find scripts run RDP Client saved servers
2014-01-30Merge pull request #26 from obscuresec/masterMatt Graeber1-105/+130
Update Invoke-ReverseDnsLookup.ps1
2014-01-30Update Invoke-ReverseDnsLookup.ps1Chris Campbell1-105/+130
Added pipeline support and verbose statement.
2013-11-13Normalized all scripts to ASCII encodingmattifestation4-7/+7
2013-11-03Fix for hostfiles option in powershell 2webstersprodigy1-2/+2
2013-10-22Fix for hostfiles option in powershell 2webstersprodigy1-2/+2
2013-07-06Merge branch 'Portscan' of https://github.com/webstersprodigy/PowerSploit ↵Matt Graeber2-2/+1090
into webstersprodigy-Portscan Conflicts: Recon/Recon.psd1
2013-07-03Updated Get-GPPPasswordMatt Graeber2-108/+2
2013-06-25IPv6 support in hosts paramRich Lundeen1-11/+14
2013-06-18fixing EOL spaces (again, sorry)Rich Lundeen1-3/+0
2013-06-18fixing EOL spacesRich Lundeen1-24/+13
2013-06-18Addressed mattifestation feedbackRich Lundeen1-235/+275
See https://github.com/mattifestation/PowerSploit/pull/6#issuecomment-19289063 1) I like this feedback a lot and took it. 2) I tried going thread only but it got messed up with very large scans. Eventually, I didn't think it was worth the amount of effort to make it reliable with only threads 3) Tried to do this 4) Did this 5) I like the idea in general and I took this one place (top-ports), but not for the two examples you gave. The reasoning is, I want people to be able to specify various options and arrays aren't that flexible. For example, I want people to specify a port list like "80,90,8080-8090". Similar with CIDR, since that's one option, but they could also be specifying hostnames e.g. "google.com,192.168.1.1/24,10.0.0.1"
2013-06-11small style updateRich Lundeen1-3/+3
2013-06-11Powershell 2.0 fixes - should work nowRich Lundeen1-124/+165
2013-06-10fixing powershell 2.0 compatRich Lundeen1-6/+18
2013-06-09removed a few commentsRich Lundeen1-6/+0
2013-06-09added invoke-portscan moduleRich Lundeen2-1/+1013
2013-01-21Consistency improvements in comment-based helpbitform3-68/+99
2013-01-20Added 'Recon' Modulebitform4-0/+199
2012-08-09Added additional recon dictionariesbitform2-0/+101
2012-08-07Added Get-HttpStatus and 'Recon' directorybitform3-0/+514
* All recon scripts not live in the 'Recon' directory * Added Get-HttpStatus - An http[s] enumeration tool * Added default dictionary for Get-HttpStatus - .\Dictionaries\admin.txt * Moved Invoke-ReverseDnsLookup to 'Recon'