A PowerShell module collection for agentless artifact gathering and reconnaissance on Windows endpoints.
Meerkat is a PowerShell-based toolset for collecting forensic artifacts and performing reconnaissance on Windows endpoints without requiring a pre-installed agent. It gathers system data like processes, services, event logs, and network configurations to support incident response, threat hunting, and baseline monitoring. The tool is designed to be lightweight and agentless, using WinRM for remote execution.
Security analysts, incident responders, and threat hunters who need to collect forensic data from Windows systems during investigations or proactive security assessments.
Meerkat stands out for its agentless approach, pure PowerShell implementation for transparency, and comprehensive artifact coverage, making it a versatile and low-impact tool for Windows endpoint forensics.
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Uses PowerShell remoting (WinRM) to gather artifacts without installing software on target systems, reducing deployment overhead and minimizing system impact.
Collects over 30 types of system data, including processes, services, event logs, and network configurations, enabling thorough incident response and threat hunting.
Exports data in structured formats like CSV by default, making it easy to ingest into SIEMs or analysis tools without additional conversion steps.
Implemented in pure PowerShell with no compiled components, allowing security professionals to easily audit, modify, and integrate the scripts into existing workflows.
Several modules, such as AuditPolicy and Processes, only return results when run with administrative rights, limiting use in environments with strict least-privilege policies.
Setting up scheduled tasks and managed service accounts involves multiple troubleshooting steps, as shown in the README, which can be time-consuming and prone to errors.
Relies entirely on Windows PowerShell and WinRM, making it incompatible with older PowerShell versions or non-Windows systems, and vulnerable to changes in Microsoft's ecosystem.