Vulnerability & Exploit Database

Back to search

Windows Gather File and Registry Artifacts Enumeration

This module will check the file system and registry for particular artifacts. The list of artifacts is read from data/post/enum_artifacts_list.txt or a user specified file. Any matches are written to the loot.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name



  • averagesecurityguy <stephen [at]>


  • windows



Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use post/windows/gather/enum_artifacts msf post(enum_artifacts) > sessions ...sessions... msf post(enum_artifacts) > set SESSION <session-id> msf post(enum_artifacts) > show options and set options... msf post(enum_artifacts) > run