Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/EncodeGroup/Gopher
C# tool to discover low hanging fruits
https://github.com/EncodeGroup/Gopher
low-hanging-fruits offensive-security pentesting-tools redteam
Last synced: 21 days ago
JSON representation
C# tool to discover low hanging fruits
- Host: GitHub
- URL: https://github.com/EncodeGroup/Gopher
- Owner: EncodeGroup
- Created: 2020-09-25T12:07:32.000Z (about 4 years ago)
- Default Branch: master
- Last Pushed: 2022-12-15T09:38:45.000Z (almost 2 years ago)
- Last Synced: 2024-08-05T17:25:31.001Z (4 months ago)
- Topics: low-hanging-fruits, offensive-security, pentesting-tools, redteam
- Language: C#
- Homepage:
- Size: 60.5 KB
- Stars: 87
- Watchers: 6
- Forks: 19
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - EncodeGroup/Gopher - C# tool to discover low hanging fruits (C# #)
README
# Gopher
If a credential is there... Gopher will find it!
Will search for low hanging fruits and useful information for escalation on a compromised workstation.
Plays nice with execute-assembly.
Digs the following holes:
* McAfee repository list files
* Cached GPP files
* Unattended installation files
* PowerShell history files
* AWS credential files
* Azure credential files
* Google Cloud credential files
* RDP sessions
* PuTTY sessions
* SuperPuTTY sessions
* WinSCP sessions
* FileZilla sessions
* VNC settings
* TeamViewer settings
* PulseSecure saved passwords# Detection
Consider placing SACLs to specific registry keys with the use of [Set-AuditRule](https://github.com/OTRF/Set-AuditRule)# Author
[@eksperience](https://github.com/eksperience)