posh-discovery
by giuliocomi
posh-discovery is a toolkit designed to map the attack surface of a compromised Windows OS by identifying open ports and live hosts.
[alpha] A set of scripts useful to run on a compromised Windows OS to map the attack surface (find of open ports, live hosts, etc.) from that Pivot. This toolkit aims to be complementary to framework that directly play with Active Directory objects.
Primary Use Case
This tool is primarily used by penetration testers and red teamers to assess the security posture of a compromised system. It helps in gathering critical information that can be leveraged for further exploitation or defense strategies.
- Network monitoring
- Identification of open ports
- Discovery of live hosts
- Complementary to Active Directory frameworks
Installation
- Clone the repository using 'git clone https://github.com/giuliocomi/posh-discovery.git'
- Navigate to the cloned directory
- Run the scripts as needed
Usage
>_ Invoke-DiscoveryRuns the main discovery script to map the attack surface.
>_ Get-LiveHostsIdentifies live hosts on the network.
>_ Get-OpenPortsScans for open ports on the compromised machine.
- Can be chained with Metasploit for automated exploitation
- Useful for continuous security monitoring in CI/CD pipelines
- Integrate with SIEM tools for real-time alerting on discovered vulnerabilities
- Consider developing a GUI for easier use by less technical team members
- Implement logging and reporting features to track the effectiveness of scans
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about posh-discovery. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
This tool hasn't been indexed yet. Request indexing to enable AI chat.
Admin will review your request within 24 hours
Related Tools
Awesome-Hacking
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
hackingtool
Z4nzu/hackingtool
ALL IN ONE Hacking Tool For Hackers
mitmproxy
mitmproxy/mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
sqlmap
sqlmapproject/sqlmap
Automatic SQL injection and database takeover tool

metasploit-framework
rapid7/metasploit-framework
Metasploit Framework
h4cker
The-Art-of-Hacking/h4cker
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security, vulnerability research, exploit development, reverse engineering, and more. 🔥 Also check: https://hackertraining.org
