Red teaming tool to dump LSASS memory, bypassing common countermeasures.
-
Updated
Nov 8, 2024 - Rust
Red teaming tool to dump LSASS memory, bypassing common countermeasures.
Perform DCSync operation without mimikatz
This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callbacks to generate a memory dump of the cloned process
Dump lsass using only Native APIs by hand-crafting Minidump files (without MiniDumpWriteDump!!!)
Dump lsass using only NTAPIs running 3 programs to create 3 JSON and 1 ZIP file... and generate the MiniDump later!
PingCastle - Get Active Directory Security at 80% in 20% of the time
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
C2 Server for pentesting, exploitation, and payload creation
This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specified Mimikatz commands.
A tool written in Go to perform a few penetration testing techniques in the environment with Active Directory.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A user-friendly Web-UI tool for Mimikatz
GATS - Gimmie all the Tools and Scripts,
Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems
Custom malware droppers written in multiple languages.
A small parser for secretsdump and cracked hashes to match username and password
Active Directory Post Exploitation
A curated list of awesome Active Directory Penetration Testing and attack resources
Add a description, image, and links to the mimikatz topic page so that developers can more easily learn about it.
To associate your repository with the mimikatz topic, visit your repo's landing page and select "manage topics."