mimikatz
There are 39 repositories under mimikatz topic.
netwrix/pingcastle
PingCastle - Get Active Directory Security at 80% in 20% of the time
ihebski/A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
lengjibo/RedTeamTools
记录自己编写、修改的部分工具
The-Viper-One/PsMapExec
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
aas-n/spraykatz
Credentials gathering tool automating remote procdump and parse of lsass process.
ricardojoserf/TrickDump
Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!
netwrix/poshkatz
PowerShell module for Mimikatz
Offensive-Panda/LsassReflectDumping
This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callbacks to generate a memory dump of the cloned process
notsoshant/DCSyncer
Perform DCSync operation without mimikatz
0xdea/blindsight
Red teaming tool to dump LSASS memory, bypassing basic countermeasures.
xFreed0m/KatzKatz
Python3 script to parse txt files containing Mimikatz output
n1nj4sec/pymemimporter
import pyd or execute PE all from memory using only pure python code and some shellcode tricks
Avienma/Mimikatz
用c#实现了个远程拉取Mimikatz.ps1
scipag/PowerShellUtilities
PowerShellUtilities provides various utility commandlets.
wangfly-me/mimikatz_bypass
Bypass国内主流杀软
3NC0D/Powershell-Obfuscator
Powerful script for logical obfuscation of powershell scripts
scipag/KleptoKitty
Invoke-KleptoKitty - Deploys Payloads and collects credentials
pooki3bear/pookiepack
Windows10 hardening implemented in powershell for consumer or enterprise deployment
maaaaz/mimicertz
A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates
her3ticAVI/TITANII
C2 Server for pentesting, exploitation, and payload creation
ricardojoserf/SSSD-creds
Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems
okankurtuluss/Invoke-Mimikatz-Bypass
This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specified Mimikatz commands.
ivan-sincek/malware-droppers
Custom malware droppers written in multiple languages.
AFrenchBanana/GaTS
GATS - Gimmie all the Tools and Scripts,
kh4sh3i/Active-Directory-Attacks
A curated list of awesome Active Directory Penetration Testing and attack resources
dvs17/mimicom
Dump lsass with windows client and extract creds with pypykatz
FOGSEC/SafetyKatz
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader
k4sth4/Golden-Ticket-Attack
Active Directory Post Exploitation
ricardojoserf/lsass-dumper
Dump lsass.exe generating a file with the hostname and date in txt format using C++.
homjxi0e/book_my_Mimikatz_arabic
Books Mimikatz
siunam321/powerkatz
A user-friendly Web-UI tool for Mimikatz
chernodv/JSMimiLogParser
Mimikatz log parser, written in JS, hosted in a browser (client side)
gsmith257-cyber/KatzParty
MimiKatz output parser, written in Powershell
seklarity/tools
Seklarity is a set of tools to extract the state of Windows Credentials
whatsyourask/divine-dragon
A tool written in Go to perform a few penetration testing techniques in the environment with Active Directory.