Professional-grade security auditing and reconnaissance solution for Windows environments
- Overview
- Core Capabilities
- Technical Specifications
- System Requirements
- Installation
- Usage Guide
- Command Reference
- Output & Reporting
- Use Cases
- Build Instructions
- Building the Installer
- Distribution
- Architecture
- Support & Licensing
SysRecon is an enterprise-class security assessment platform designed to provide comprehensive visibility into Windows system configurations, security posture, and potential vulnerabilities. Built for security professionals, system administrators, and compliance teams, SysRecon automates the complex process of security auditing while delivering actionable intelligence through sophisticated analysis and reporting capabilities.
- Comprehensive Coverage: Six specialized assessment modules covering user accounts, services, processes, network infrastructure, registry configurations, and memory forensics
- Enterprise Architecture: Built with C++20 for optimal performance and minimal system footprint
- Flexible Deployment: Cross-platform compilation support with native Windows execution
- Professional Reporting: Multi-format output including JSON, CSV, and HTML with executive summaries and detailed technical findings
- Production-Ready: Over 6,500 lines of production-quality code with extensive Windows API integration
- Comprehensive enumeration of local users and security groups via NetUserEnum API
- Security Identifier (SID) resolution and privilege level analysis
- Group membership mapping and administrator account detection
- Account policy assessment and anomaly detection
- Complete Windows service inventory through Service Control Manager integration
- Startup configuration analysis (Automatic, Manual, Disabled, Delayed)
- Detection of unquoted service pathsβa critical privilege escalation vector
- Service account security posture evaluation
- Binary signature verification and path validation
- Real-time process enumeration using Toolhelp32 API
- Comprehensive loaded module analysis with path and signature details
- Process memory footprint assessment
- Detection of suspicious processes and uncommon execution patterns
- Parent-child process relationship mapping
- Active TCP/UDP connection enumeration with remote endpoint resolution
- Listening port analysis and service binding identification
- Network interface discovery including MAC addresses, IP configurations, and DHCP status
- Network share enumeration with permission analysis
- Windows Firewall rule and policy assessment
- Network adapter configuration review
- Persistence mechanism detection across standard autorun locations
- Security policy configuration review (UAC, Windows Defender, BitLocker)
- Registry permission and ACL analysis
- Browser Helper Object (BHO) and toolbar detection
- Image File Execution Options (IFEO) monitoring for debugger attachments
- Run/RunOnce key enumeration across HKLM and HKCU hives
- Process memory region enumeration via VirtualQueryEx
- Detection of Read-Write-Execute (RWX) memory regionsβindicators of code injection
- DLL injection pattern recognition
- Process hollowing detection through PE header validation
- Shellcode signature matching using pattern analysis
- Memory-resident threat identification
- JSON: Structured data output for SIEM integration, automation workflows, and programmatic analysis
- CSV: Spreadsheet-compatible format for data manipulation in Excel, database import, and trend analysis
- HTML: Executive-ready reports with risk-based color coding, sortable tables, and professional styling
- Critical: Active exploitation indicators requiring immediate remediation
- High: Significant vulnerabilities or misconfigurations with elevated risk
- Medium: Security weaknesses requiring attention within planned maintenance windows
- Low: Best practice deviations and informational findings
- High-level security posture summaries
- Trend analysis across multiple assessments
- Compliance mapping to industry frameworks
- Prioritized remediation recommendations
| Component | Specification |
|---|---|
| Language | C++20 with modern standard library features |
| Build System | CMake 3.20+ for cross-platform compilation |
| Target OS | Windows 10, Windows 11, Server 2016/2019/2022 |
| Architecture | x64 (64-bit) only |
| Compiler | MinGW-w64 GCC 15.2.0 (cross-compilation) or MSVC 2022 (native) |
| Binary Format | PE32+ executable with code signing support |
| Dependencies | nlohmann/json 3.11.3 (header-only, embedded) |
| Binary Size | ~18 MB (optimized release build) |
SysRecon leverages native Windows APIs for maximum compatibility and performance:
Security & Identity
NetUserEnum,NetLocalGroupEnum,NetLocalGroupGetMembersLookupAccountSid,LookupAccountNameGetTokenInformation,OpenProcessToken
Service Management
OpenSCManager,EnumServicesStatusEx,QueryServiceConfigQueryServiceConfig2,QueryServiceStatus
Process & Memory
CreateToolhelp32Snapshot,Process32First,Process32NextModule32First,Module32NextVirtualQueryEx,ReadProcessMemory,OpenProcess
Network Operations
GetTcpTable2,GetUdpTable,GetExtendedUdpTableGetAdaptersInfo,GetAdaptersAddressesNetShareEnum,NetShareGetInfo
Registry Access
RegOpenKeyEx,RegEnumValue,RegEnumKeyExRegGetKeySecurity,RegQueryValueEx
System Information
GetComputerName,GetVersionEx,GetSystemInfoGetNativeSystemInfo,IsWow64Process
| Requirement | Specification |
|---|---|
| Operating System | Windows 10 version 1809+, Windows 11, Windows Server 2016+ |
| Architecture | x64 (64-bit) systems only |
| Memory | 2 GB RAM minimum, 4 GB recommended |
| Storage | 100 MB free disk space for installation and reports |
| Privileges | Administrator or equivalent elevated rights |
| Runtime | .NET Framework 4.8+ (typically pre-installed on modern Windows) |
Compatibility Notes:
- Windows 10 versions prior to 1809 may experience limited functionality
- ARM64 architecture not currently supported
- Domain-joined or standalone workstations fully supported
Arch Linux:
sudo pacman -S mingw-w64-gcc mingw-w64-cmake cmake make base-devel gitUbuntu 20.04 LTS / Debian 11+:
sudo apt update
sudo apt install mingw-w64 cmake build-essential git pkg-configRHEL 8+ / Fedora 35+:
sudo dnf install mingw64-gcc-c++ mingw64-winpthreads-static cmake make git| Component | Version | Notes |
|---|---|---|
| Visual Studio | 2022 (17.0+) | Community, Professional, or Enterprise |
| Workload | Desktop development with C++ | Must include Windows 10/11 SDK |
| CMake | 3.20+ | Add to PATH during installation |
| Git | 2.30+ | Git for Windows recommended |
| Windows SDK | 10.0.19041.0+ | Included with Visual Studio C++ workload |
Professional Graphical Setup Wizard:
SysRecon includes a professional Windows installer with full GUI for easy deployment.
β
Graphical Installation Wizard - Click-through setup like professional software
β
Start Menu Integration - Multiple shortcuts (main app, help, quick scan, reports)
β
Desktop Shortcut - Optional quick access from desktop
β
PATH Integration - Optional command-line access from anywhere
β
Automatic Configuration - Sets up reports directory and default config
β
Professional Uninstaller - Complete removal with option to keep reports
- Download
SysRecon-Setup-1.0.0.exefrom releases - Right-click β "Run as Administrator"
- Follow the installation wizard
- Launch from Start Menu β SysRecon
See INSTALLER_GUIDE.md for complete documentation.
Windows:
REM Install NSIS from: https://nsis.sourceforge.io/Download
REM Build the project first
build.bat
REM Create installer
build-installer.bat
REM Result: SysRecon-Setup-1.0.0.exeLinux (Cross-compilation):
# Install NSIS
sudo pacman -S nsis # Arch
sudo apt install nsis # Ubuntu
# Build the project first
./build.sh
# Create installer
./build-installer.sh
# Result: SysRecon-Setup-1.0.0.exe (transfer to Windows)For Production Deployments (No Installation Required):
- Download the latest release from the official repository
- Verify the digital signature (recommended for enterprise environments)
- Deploy to target Windows systems via your standard software distribution method
- Execute with administrator privileges
# Verify digital signature (PowerShell)
Get-AuthenticodeSignature C:\Tools\sysrecon.exe
# Run with administrator privileges
Start-Process -FilePath "C:\Tools\sysrecon.exe" -Verb RunAs -ArgumentList "--help"For Custom Deployments or Development:
See the Build Instructions section for detailed compilation procedures.
Administrator Privileges Required: Most assessment modules require elevated privileges to access system-level APIs and security information. Execute SysRecon from an elevated command prompt or PowerShell session.
REM Right-click Command Prompt β "Run as administrator"
REM Or use PowerShell with elevation:
Start-Process cmd.exe -Verb RunAsWhen you launch sysrecon.exe without any arguments, it will display an interactive menu that guides you through all available options:
sysrecon.exeInteractive Menu Features:
- π― User-Friendly Interface: Navigate through options with simple number selections
- β Option Validation: All menu options are tested and guaranteed to work
- π Module Selection: Easily choose which security modules to run
- βοΈ Configuration: Change settings without remembering command-line syntax
- π Report Options: Select output formats visually
- π Multiple Scan Modes: Full scan, selective scan, quick scan, stealth mode
Menu Options Include:
- Run Full System Scan (All Modules)
- Run Selective Module Scan
- Quick Scan Mode
- Stealth Mode Scan
- Configure Settings (output directory, formats, verbosity)
- View Report Options
- About / Version Info
- Help & Command-Line Usage
Example Workflow:
1. Launch: sysrecon.exe
2. Choose option "2" (Selective Module Scan)
3. Select modules: 1 (Accounts), 2 (Services), 4 (Network)
4. Choose option "8" (Start Scan)
5. Reports generated automatically!
sysrecon.exeLaunches the interactive menu. For command-line usage, see examples below.
To run a full scan via command-line:
sysrecon.exe --accounts --services --processes --network --registry --memoryExecutes a comprehensive security assessment across all modules with default configuration.
sysrecon.exe --quickPerforms accelerated scanning with reduced depthβideal for rapid initial reconnaissance.
sysrecon.exe --verboseEnables detailed logging output for troubleshooting and audit trail generation.
REM User account and privilege assessment
sysrecon.exe --accounts
REM Service configuration analysis
sysrecon.exe --services
REM Process and module enumeration
sysrecon.exe --processes
REM Network infrastructure assessment
sysrecon.exe --network
REM Registry persistence analysis
sysrecon.exe --registry
REM Memory forensics and injection detection
sysrecon.exe --memoryREM Security-focused assessment
sysrecon.exe --accounts --services --registry
REM Network and process analysis
sysrecon.exe --network --processes
REM Complete forensic assessment
sysrecon.exe --memory --processes --registrysysrecon.exe --output "C:\SecurityAssessments\Audit_2025-11-13"REM Single format
sysrecon.exe --format json
sysrecon.exe --format csv
sysrecon.exe --format html
REM Multiple formats
sysrecon.exe --format json --format html
REM All formats (default)
sysrecon.exe --format allsysrecon.exe --accounts --services --network ^
--output "C:\Audits\Monthly\2025-11" ^
--format all ^
--verbosesysrecon.exe --stealth --quietMinimizes system footprint and suppresses console outputβuseful for sensitive environments or systems under active monitoring.
sysrecon.exe --config compliance-template.json ^
--output "C:\Compliance\SOC2-Audit"Leverages custom configuration profiles for compliance-specific assessments.
| Option | Description |
|---|---|
-h, --help |
Display comprehensive usage information and exit |
-v, --version |
Display version information and build details |
--verbose |
Enable detailed diagnostic output and API call logging |
--quiet |
Suppress all non-critical console output |
--quick |
Enable fast-scan mode with reduced analysis depth |
--stealth |
Minimize system footprint and detection signatures |
| Option | Argument | Description |
|---|---|---|
-c, --config |
<file> |
Load configuration from JSON file (default: config.json) |
-o, --output |
<directory> |
Set output directory for reports (default: ./reports) |
-f, --format |
<format> |
Report format: json, csv, html, all (default: all) |
| Option | Module | Scope |
|---|---|---|
--accounts |
User Accounts | Local user enumeration, group analysis, privilege assessment |
--services |
Windows Services | Service configuration, startup analysis, path validation |
--processes |
Running Processes | Process enumeration, module loading, memory footprint |
--network |
Network Infrastructure | Connections, interfaces, shares, firewall rules |
--registry |
Registry Analysis | Persistence keys, security policies, ACL analysis |
--memory |
Memory Forensics | Memory scanning, injection detection, shellcode analysis |
--all |
All Modules | Comprehensive assessment (default if no modules specified) |
| Option | Description |
|---|---|
--no-admin-check |
Skip administrator privilege verification (not recommended) |
--timeout <seconds> |
Set maximum execution time per module (default: 300) |
--threads <count> |
Set thread pool size for parallel operations (default: 4) |
Purpose: Machine-readable structured data for SIEM integration, API consumption, and automated analysis workflows.
Schema:
{
"metadata": {
"scan_id": "uuid-v4",
"timestamp": "2025-11-13T14:25:30Z",
"hostname": "WORKSTATION-01",
"os_version": "Windows 10 Enterprise 21H2",
"os_build": "19044.1234",
"domain": "CORPORATE",
"scan_duration_seconds": 142,
"modules_executed": ["accounts", "services", "network"]
},
"findings": [
{
"module": "accounts",
"severity": "high",
"category": "privilege_escalation",
"title": "Administrator Account Enabled",
"description": "Built-in Administrator account is active and not renamed",
"affected_item": "Administrator",
"recommendation": "Rename or disable the built-in Administrator account",
"references": ["CIS Windows Benchmark 1.1.4"]
}
],
"statistics": {
"total_findings": 24,
"by_severity": {
"critical": 2,
"high": 8,
"medium": 10,
"low": 4
}
}
}Purpose: Spreadsheet analysis, database import, and business intelligence tools.
Structure:
Module,Severity,Category,Title,Item,Recommendation
accounts,high,privilege_escalation,Administrator Account Enabled,Administrator,Rename or disable built-in Administrator
services,medium,configuration,Unquoted Service Path,BackupService,Quote the service executable path
registry,high,persistence,Unauthorized Autorun Entry,HKLM\...\Run\malware,Remove unauthorized autorun entryPurpose: Executive presentations, management reporting, and human-readable assessment summaries.
Features:
- Professional CSS styling with corporate color schemes
- Risk-based color coding (Critical: Red, High: Orange, Medium: Yellow, Low: Green)
- Sortable and filterable data tables
- Executive summary section with key metrics
- Detailed findings with remediation guidance
- Embedded charts and statistics
- Print-optimized layouts
Reports follow a standardized naming convention for easy organization:
sysrecon_<hostname>_<timestamp>_<module>.<format>
Examples:
sysrecon_WKS-01_20251113-142530_full.json
sysrecon_SRV-DB-01_20251113-142530_accounts.csv
sysrecon_WORKSTATION_20251113-142530_comprehensive.html
C:\SecurityAssessments\
βββ Audit_2025-11-13\
βββ sysrecon_WKS-01_20251113-142530_full.json
βββ sysrecon_WKS-01_20251113-142530_full.csv
βββ sysrecon_WKS-01_20251113-142530_full.html
βββ logs\
βββ sysrecon_20251113-142530.log
Scenario: Continuous security monitoring and threat hunting
REM Automated daily assessment with SIEM integration
sysrecon.exe --quick --format json ^
--output "\\soc-share\assessments\%COMPUTERNAME%\%DATE%"
REM Schedule via Task Scheduler for automated executionIntegration: Parse JSON output with Splunk, ELK Stack, or Microsoft Sentinel for trend analysis and alerting.
Scenario: Rapid system triage during security incidents
REM Comprehensive forensic capture
sysrecon.exe --memory --processes --network --registry ^
--output "C:\IR\Case-2025-001\%COMPUTERNAME%" ^
--format all ^
--verbose
REM Focus on persistence mechanisms
sysrecon.exe --registry --services --startup ^
--format json ^
--output "C:\IR\Persistence-Analysis"Deliverables: Evidence collection, timeline analysis, and executive incident briefs.
Scenario: Post-exploitation enumeration and privilege escalation
REM Initial reconnaissance
sysrecon.exe --quick --accounts --network --stealth
REM Service vulnerability identification
sysrecon.exe --services --verbose
REM Privilege escalation vector analysis
sysrecon.exe --accounts --services --registry ^
--format html ^
--output "C:\PenTest\Client-ABC\Enumeration"Focus: Unquoted service paths, weak permissions, and credential exposure.
Scenario: Regulatory compliance verification (PCI-DSS, HIPAA, SOC 2)
REM Monthly compliance assessment
sysrecon.exe --config compliance-pci-dss.json ^
--output "C:\Compliance\PCI-DSS\%DATE%" ^
--format all
REM Quarterly executive reporting
sysrecon.exe --accounts --services --network --registry ^
--format html ^
--output "C:\Compliance\Quarterly\Q4-2025"Deliverables: Evidence packages for auditors, gap analysis, and remediation tracking.
Scenario: Proactive security posture assessment
REM Weekly vulnerability scanning
sysrecon.exe --services --processes --network ^
--output "C:\VulnMgmt\Weekly\Week-%DATE:~-5,2%"
REM Pre-patch assessment baseline
sysrecon.exe --all --format all ^
--output "C:\Baselines\Pre-Patch-2025-11"Integration: Compare baselines to identify configuration drift and unauthorized changes.
Scenario: Post-hardening verification
REM Validate CIS Benchmark implementation
sysrecon.exe --accounts --services --registry ^
--config cis-benchmark-level1.json ^
--output "C:\Hardening\Post-Implementation"
REM Compare with baselineπ For Complete Build Guide: See BUILD_GUIDE.md for comprehensive instructions including:
- Detailed Linux cross-compilation steps
- Windows native build instructions
- NSIS installer creation
- Distribution package creation
- Troubleshooting common issues
Arch Linux:
sudo pacman -S mingw-w64-gcc cmake make gitUbuntu 20.04 LTS / Debian 11:
sudo apt update && sudo apt upgrade -y
sudo apt install -y mingw-w64 cmake build-essential gitFedora 35+ / RHEL 8:
sudo dnf install -y mingw64-gcc-c++ cmake make git# Clone repository
git clone https://github.com/XpertLambda/SysRecon.git
cd SysRecon
# Run build script (easiest method)
./build.sh
# Output: build/sysrecon.exe (~17 MB)# Create build directory
mkdir -p build && cd build
# Configure with MinGW-w64 toolchain
cmake -DCMAKE_TOOLCHAIN_FILE=../cmake/mingw-w64-x86_64.cmake \
-DCMAKE_BUILD_TYPE=Release \
..
# Build with parallel compilation
make -j$(nproc)
# Output: build/sysrecon.exe-
Install Visual Studio 2022
- Download Community Edition from visualstudio.microsoft.com
- Select "Desktop development with C++" workload
- Include Windows 10/11 SDK
-
Install CMake & Git
- CMake: cmake.org/download
- Git: git-scm.com
# Open "Developer Command Prompt for VS 2022"
# Clone repository
git clone https://github.com/XpertLambda/SysRecon.git
cd SysRecon
# Run build script
.\build.bat
# Or manual build:
mkdir build
cd build
cmake -G "Visual Studio 17 2022" -A x64 ..
cmake --build . --config Release --parallel
# Output: build\Release\sysrecon.exeInstall NSIS (Nullsoft Scriptable Install System):
# Arch Linux (using AUR helper)
yay -S nsis
# or
paru -S nsis
# Ubuntu/Debian
sudo apt install nsis
# Fedora/RHEL
sudo dnf install nsis
# Verify installation
makensis -VERSION # Should show v3.11 or higher# 1. Build the executable first
./build.sh
# 2. Run installer build script
./build-installer.sh
# Output: SysRecon-Setup-1.1.0.exe (~3.9 MB)What the installer includes:
- β Main executable (sysrecon.exe)
- β Default configuration (config.json)
- β Documentation (README.txt)
- β License file
- β Start Menu shortcuts (6 shortcuts)
- β Optional desktop shortcut
- β Uninstaller
- β Registry integration
Option 1: Windows Installer (Recommended) β
π¦ SysRecon-Setup-1.1.0.exe (3.9 MB)
- Complete installation package
- Professional setup wizard
- Easy uninstallation
Option 2: Portable Package
π¦ SysRecon-1.1.0-Portable.zip (~17 MB)
βββ sysrecon.exe # Main executable
βββ config.json # Configuration
βββ README.md # Documentation
βββ LICENSE # License file
βββ reports/ # Output folder
Option 3: Both (Complete Distribution)
Upload to GitHub Release:
βββ SysRecon-Setup-1.1.0.exe # Installer
βββ sysrecon.exe # Portable executable
βββ checksums.txt # SHA256 hashes
βββ Source code (auto-generated by GitHub)
# Generate SHA256 checksums for verification
sha256sum SysRecon-Setup-1.1.0.exe > checksums.txt
sha256sum build/sysrecon.exe >> checksums.txt
# Users can verify integrity on Windows:
# Get-FileHash -Algorithm SHA256 SysRecon-Setup-1.1.0.exeMinimum (Portable):
sysrecon.exe(main executable)config.json(configuration file)
Recommended (Complete):
SysRecon-Setup-1.1.0.exe(installer - includes everything)checksums.txt(file verification)- Documentation (README, CHANGELOG)
# Verify installation
which x86_64-w64-mingw32-gcc
# Expected output: /usr/bin/x86_64-w64-mingw32-gcc
# If not found, reinstall MinGW-w64
# Arch: sudo pacman -S mingw-w64-gcc
# Ubuntu: sudo apt install mingw-w64# Use absolute path to toolchain file
cmake -DCMAKE_TOOLCHAIN_FILE=$(realpath ../cmake/mingw-w64-x86_64.cmake) \
-DCMAKE_BUILD_TYPE=Release ..# Clean build directory
rm -rf build && mkdir build && cd build
# Rebuild with verbose output
make VERBOSE=1 2>&1 | tee build.log# Verify Visual Studio installation
where cl.exe
# Use Developer Command Prompt specifically for VS 2022
# Or specify generator explicitly
cmake -G "Visual Studio 17 2022" -A x64 ..SysRecon/
β
βββ cmake/ # Build system configuration
β βββ mingw-w64-x86_64.cmake # MinGW-w64 cross-compilation toolchain
β βββ Windows.cmake # Windows-specific build settings
β
βββ docs/ # Documentation
β βββ API.md # API reference documentation
β βββ SECURITY.md # Security considerations
β βββ COMPLIANCE.md # Compliance framework mappings
β
βββ external/ # Third-party dependencies
β βββ json/ # nlohmann::json (embedded)
β βββ json.hpp
β
βββ include/ # Public header files
β βββ sysrecon.h # Main library header
β βββ core/ # Core infrastructure headers
β β βββ engine.h # Scanning engine
β β βββ config.h # Configuration management
β β βββ logger.h # Logging subsystem
β β
β βββ modules/ # Module interface headers
β βββ accounts.h
β βββ services.h
β βββ processes.h
β βββ network.h
β βββ registry.h
β βββ memory.h
β βββ reporting.h
β
βββ modules/ # Module implementations
β βββ accounts/ # User account enumeration
β β βββ accounts.cpp
β β βββ sid_resolver.cpp
β β
β βββ services/ # Service analysis
β β βββ services.cpp
β β βββ unquoted_paths.cpp
β β
β βββ processes/ # Process monitoring
β β βββ processes.cpp
β β βββ modules.cpp
β β
β βββ network/ # Network assessment
β β βββ network.cpp
β β βββ interfaces.cpp
β β βββ shares.cpp
β β βββ firewall.cpp
β β
β βββ registry/ # Registry analysis
β β βββ registry.cpp
β β βββ persistence.cpp
β β βββ policies.cpp
β β
β βββ memory/ # Memory forensics
β β βββ memory.cpp
β β βββ injection.cpp
β β βββ shellcode.cpp
β β
β βββ reporting/ # Report generation
β βββ json_reporter.cpp
β βββ csv_reporter.cpp
β βββ html_reporter.cpp
β
βββ src/ # Core application source
β βββ main.cpp # Application entry point
β βββ core/ # Core implementation
β β βββ engine.cpp
β β βββ config.cpp
β β βββ logger.cpp
β β
β βββ cli/ # Command-line interface
β βββ cli_parser.cpp
β
βββ tests/ # Unit and integration tests
β βββ test_accounts.cpp
β βββ test_services.cpp
β βββ test_processes.cpp
β βββ test_network.cpp
β βββ test_registry.cpp
β βββ test_memory.cpp
β βββ test_reporting.cpp
β
βββ build/ # Build output (git-ignored)
β βββ sysrecon.exe # Compiled executable
β
βββ CMakeLists.txt # Root CMake configuration
βββ README.md # This file
βββ LICENSE # License information
βββ CHANGELOG.md # Version history
βββ .gitignore # Git ignore rules
Each assessment capability is encapsulated in an independent module with well-defined interfaces, enabling:
- Selective module execution
- Parallel processing where applicable
- Easy extension with new assessment capabilities
- Minimal Footprint: Compiled to native x64 code with no runtime dependencies
- Efficient Memory Usage: Streaming report generation prevents memory exhaustion
- Parallel Execution: Thread pool architecture for concurrent module execution
- Error Handling: Comprehensive exception handling and graceful degradation
- API Failure Management: Robust handling of failed Windows API calls
- Logging: Detailed diagnostic logging for troubleshooting
- No Network Communication: All operations execute locally
- No Persistence: No modifications to system configuration or registry
- Secure APIs: Exclusive use of documented Windows APIs
- Audit Trail: Complete logging of all operations
SysRecon is commercial software. For licensing inquiries, enterprise support, or custom development:
Contact: XpertLambda
Email: [Contact through repository]
Discord: thelambda
- Email support (24-hour response time)
- Security updates and patches
- Minor version upgrades
- Priority email and phone support (4-hour response time)
- Dedicated technical account manager
- Custom feature development
- On-site training and implementation assistance
- Compliance certification support
Copyright Β© 2025 XpertLambda. All Rights Reserved.
This software is proprietary and confidential. Unauthorized copying, modification, distribution, or use of this software, via any medium, is strictly prohibited without express written permission from the copyright holder.
SysRecon is designed for legitimate security assessment, auditing, and compliance verification. Users must:
- Obtain explicit authorization before scanning systems
- Comply with all applicable laws and regulations
- Respect data privacy and protection requirements
- Follow responsible disclosure practices for discovered vulnerabilities
- Use the tool only within the scope of their professional duties
Misuse of this tool for unauthorized access, malicious purposes, or any illegal activity is strictly prohibited and may result in civil and criminal penalties.
- Microsoft Security Documentation
- Windows API Reference
- MITRE ATT&CK Framework
- CIS Windows Benchmarks
- Issues: Report bugs and request features via GitHub Issues
- Discussions: Community forum on GitHub Discussions
- Security Reports: security@[domain].com (PGP key available)
Q: Does SysRecon require Administrator privileges?
A: Yes, most scanning modules require elevated privileges to access system-level Windows APIs and security information.
Q: Is SysRecon safe to run?
A: Yes, SysRecon is a read-only assessment tool. It does not modify system settings, install services, or perform any destructive actions.
Q: Will antivirus software flag SysRecon?
A: Some antivirus software may flag SysRecon due to its system scanning capabilities and use of low-level Windows APIs. This is a false positive. Enterprise deployments should whitelist the application.
Q: Can I run SysRecon on Windows Server?
A: Yes, SysRecon is fully compatible with Windows Server 2016, 2019, and 2022 (x64 architecture).
Q: Does SysRecon require internet connectivity?
A: No, SysRecon operates entirely offline. It does not transmit any data or require network access.
Q: How long does a full scan take?
A: Scan duration varies based on system configuration. Typical ranges:
- Quick scan: 30-60 seconds
- Full scan (without memory): 2-5 minutes
- Full scan (with memory forensics): 5-15 minutes
Q: Can I automate SysRecon with Task Scheduler?
A: Yes, SysRecon is designed for automation. Use Windows Task Scheduler to run periodic assessments with specific command-line options.
Q: What is the difference between JSON, CSV, and HTML reports?
A:
- JSON: Machine-readable format ideal for SIEM integration, automation, and programmatic analysis
- CSV: Spreadsheet format for data manipulation in Excel or database import
- HTML: Human-readable format with professional styling for management presentations
Q: How do I interpret risk severity levels?
A:
- Critical: Immediate action required (active exploitation indicators)
- High: Significant vulnerabilities requiring prompt remediation
- Medium: Security weaknesses requiring attention in planned maintenance
- Low: Best practice deviations and informational findings
Q: Can I customize the scanning behavior?
A: Yes, create a custom JSON configuration file and use the --config option. See the default config.json for available parameters.
Q: Does SysRecon detect all types of malware?
A: SysRecon is not a traditional antivirus tool. It identifies indicators of compromise (IOCs) such as:
- Unquoted service paths (privilege escalation vectors)
- Suspicious registry persistence mechanisms
- Memory injection patterns (RWX regions, DLL injection)
- Unusual process behaviors
For comprehensive malware detection, use SysRecon alongside dedicated endpoint protection solutions.
Q: How does SysRecon differ from tools like PowerShell scripts?
A: SysRecon offers:
- Compiled native performance (C++20)
- Professional multi-format reporting
- Deep Windows API integration (25+ APIs)
- Memory forensics capabilities
- Enterprise-ready installation and deployment
- No PowerShell execution policy requirements
Q: Can I deploy SysRecon via Group Policy?
A: Yes, use Group Policy software deployment to distribute the MSI installer or portable executable across your domain.
Q: Does SysRecon support silent installation?
A: Yes, use the /S flag for silent installation:
SysRecon-Setup-1.0.0.exe /SQ: Where are reports stored by default?
A:
- Installed version:
C:\Program Files\SysRecon\reports\ - Portable version:
.\reports\(relative to executable location)
Q: Can I run SysRecon from a USB drive?
A: Yes, use the portable executable version. Note that administrator privileges are still required on the target system.
Q: How do I uninstall SysRecon?
A:
- Via installer: Control Panel β Programs β Uninstall a program β SysRecon
- Manual: Run the uninstaller from
C:\Program Files\SysRecon\Uninstall.exe
Initial Release
- β Six specialized security assessment modules (Accounts, Services, Processes, Network, Registry, Memory)
- β 25+ Windows API integrations for comprehensive system visibility
- β Multi-format reporting (JSON, CSV, HTML) with risk-based color coding
- β Professional Windows installer with GUI wizard
- β Cross-platform build system (Linux cross-compilation, Windows native)
- β 6,500+ lines of production-quality C++20 code
- User account and group enumeration with privilege analysis
- Windows service configuration analysis and unquoted path detection
- Process and module monitoring with parent-child relationship mapping
- Network infrastructure assessment (connections, interfaces, shares, firewall)
- Registry persistence mechanism detection and security policy analysis
- Memory forensics (RWX region detection, DLL injection, process hollowing)
- Risk assessment framework (Critical, High, Medium, Low)
- Executive summary generation with statistics
- SIEM integration support via JSON output
- Compliance framework mapping
- Sortable and filterable HTML reports
- Professional Windows installer (NSIS-based, 3.9 MB)
- Portable executable (18 MB, no installation required)
- Silent installation support for enterprise deployment
- Start Menu integration and optional PATH configuration
- CMake-based cross-platform build system
- MinGW-w64 toolchain for Linux cross-compilation
- Visual Studio 2022 support for native Windows builds
- Automated installer generation scripts
- Comprehensive README with usage examples
- Command-line reference guide
- Build instructions for multiple platforms
- Use case scenarios and deployment patterns
- π Active Directory Integration: Domain user enumeration and GPO analysis
- π Scheduled Scanning: Built-in task scheduling without Task Scheduler
- π Differential Analysis: Compare scan results to identify configuration drift
- π Custom Rules Engine: User-defined detection rules and policies
- π PowerShell Module: Native PowerShell cmdlets for integration
- π Web Dashboard: Central management console for multiple endpoints
- π Real-time Monitoring: Continuous assessment with alerting
- π Remediation Actions: Automated fix capabilities for common issues
- π Compliance Profiles: Pre-built templates for major frameworks (CIS, NIST, PCI-DSS)
- π Advanced Memory Analysis: Enhanced shellcode detection and YARA rule support
- π Cloud Integration: Azure AD and Microsoft 365 security assessment
- π Container Support: Docker and Kubernetes security scanning
- π API Server: RESTful API for programmatic access
- π Machine Learning: Behavioral anomaly detection
- π Multi-language Support: Internationalization (i18n)
Want to see a specific feature? Submit a feature request via GitHub Issues.
| Scan Type | Duration | Modules |
|---|---|---|
| Quick Scan | 30-45 seconds | Accounts, Services |
| Standard Scan | 2-3 minutes | All except Memory |
| Full Scan | 5-10 minutes | All modules |
| Memory-Only Scan | 3-8 minutes | Memory forensics |
Test System: Windows 10 Pro, Intel Core i5-8250U, 16GB RAM, SSD
| Metric | Quick Scan | Full Scan | Memory Scan |
|---|---|---|---|
| CPU Usage | 5-15% | 10-25% | 15-40% |
| Memory Usage | 50-100 MB | 100-200 MB | 200-500 MB |
| Disk I/O | Minimal | Low | Moderate |
| System Type | Typical Scan Time | Notes |
|---|---|---|
| Workstation (< 50 services) | 2-3 minutes | Standard desktop |
| Power User (50-100 services) | 3-5 minutes | Developer workstation |
| Server (100-200 services) | 5-10 minutes | Domain controller, database server |
| Enterprise Server (200+ services) | 10-15 minutes | Large application servers |
- nlohmann/json - JSON for Modern C++ (MIT License)
- Elegant JSON parsing and serialization library
- Header-only design for easy integration
-
MinGW-w64 - Minimalist GNU for Windows
- Cross-compilation toolchain enabling Linux-based builds for Windows targets
-
CMake - Cross-platform build system
- Modern build configuration and dependency management
-
NSIS - Nullsoft Scriptable Install System
- Professional Windows installer generation
- Microsoft Security Documentation - Windows API reference and best practices
- MITRE ATT&CK Framework - Threat modeling and detection techniques
- CIS Benchmarks - Security configuration standards
- OWASP - Application security guidelines
To the information security community for continuous research, threat intelligence sharing, and dedication to improving enterprise security posture.
Current Version: 1.0.0
Release Date: November 13, 2025
Status: β
Production-Ready
Maintenance: π’ Actively Maintained
- Total Code Lines: ~6,500 LOC (excluding comments and blank lines)
- Source Files: 14 implementation files (.cpp)
- Header Files: 12 header files (.h/.hpp)
- Modules: 6 scanning modules + 1 reporting module
- Windows APIs Used: 25+ distinct API functions
- Binary Size: 18 MB (optimized release build)
- Installer Size: 3.9 MB (LZMA compressed)
| Platform | Compiler | Status |
|---|---|---|
| Linux β Windows | MinGW-w64 GCC 15.2.0 | β Passing |
| Windows | Visual Studio 2022 (MSVC) | β Passing |
| Windows | MinGW-w64 (Native) | β Passing |
- β Unit tests for core modules
- β Integration tests for Windows API calls
- β Regression tests for known issues
- β Performance benchmarks
- π Continuous integration (planned)
SysRecon does NOT collect or transmit any data.
- All operations execute locally on the target system
- No network communication or telemetry
- No data sent to external servers
- Reports stored locally only
When using SysRecon in production environments:
- Verify Digital Signatures: Always verify the executable signature before deployment
- Secure Report Storage: Store reports in encrypted locations with appropriate ACLs
- Access Control: Limit SysRecon execution to authorized personnel only
- Audit Logging: Enable Windows audit logging to track SysRecon execution
- Regular Updates: Keep SysRecon updated for latest security improvements
If you discover a security vulnerability in SysRecon:
- Do NOT create a public GitHub issue
- Email details to: security@[domain].com
- Include:
- Vulnerability description
- Steps to reproduce
- Potential impact assessment
- Suggested remediation (if available)
- Allow 90 days for response and remediation before public disclosure
SysRecon is built with security in mind:
- β DEP (Data Execution Prevention): Enabled
- β ASLR (Address Space Layout Randomization): Enabled
- β Control Flow Guard (CFG): Enabled
- β Input Validation: All user inputs sanitized
- β Safe String Handling: No unsafe C-style string functions
- β Exception Handling: Comprehensive error handling throughout
SysRecon - Professional Windows Security Assessment Platform
Version 1.0.0 | Build 20251113 | Platform: Windows 10/11, Server 2016+
Engineered for security professionals. Built for enterprise environments.
Copyright Β© 2025 XpertLambda. All Rights Reserved.