Description

TaskHound is an open-source security tool designed to assist red teamers, penetration testers and security operations teams in identifying high-risk scheduled tasks on Windows systems. It focuses on tasks running under privileged or Tier-0 accounts (Domain Admins) or tasks using stored credentials, which can represent significant exploitation opportunities. TaskHound automates the auditing of the Windows Task Scheduler environment by scanning remote machines via SMB, retrieving task XML definitions and parsing them for risky attributes (For example tasks running as Administrator, tasks with stored clear text credentials). The tool supports integration with BloodHound (both the Community Edition and Legacy formats) to enrich scheduled task data with Active Directory attack path context. For example, it can map tasks to Tier 0 users and flag where tasks provide direct RunsAs relations that may facilitate escalation. Additional capabilities include, offline mode (processing previously collected XMLs without live network access), SID resolution via LDAP, password age comparison (relative to task creation date) to highlight stale credentials, and detection of whether Windows Credential Guard is enabled (which may affect ability to dump DPAPI protected task credentials). Because it uses standard SMB/RPC operations (via impacket under the hood), TaskHound emphasizes OPSEC considerations,especially in adversary simulation scenarios where noisy scanning may be detected.