# Enumeration and Discovery

* [Windows Event IDs and Others for Situational Awareness](https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/windows-event-ids-and-others-for-situational-awareness)
* [Enumerating COM Objects and their Methods](https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/enumerating-com-objects-and-their-methods)
* [Enumerating Users without net, Services without sc and Scheduled Tasks without schtasks](https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/enumerating-users-without-net-services-without-sc-and-scheduled-tasks-without-schtasks)
* [Enumerating Windows Domains with rpcclient through SocksProxy == Bypassing Command Line Logging](https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/enumerating-windows-domains-with-rpcclient-through-socksproxy-bypassing-command-line-logging)
* [Dump Global Address List (GAL) from OWA](https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/dump-global-address-list-gal-from-owa)
* [Application Window Discovery](https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/application-window-discovery)
* [Account Discovery & Enumeration](https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/account-discovery-and-enumeration)
* [Using COM to Enumerate Hostname, Username, Domain, Network Drives](https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/using-com-to-enumerate-hostname-username-domain-network-drives)
* [Detecting Sysmon on the Victim Host](https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/detecting-sysmon-on-the-victim-host)
