PRINT
PRINT
SEND MAIL
SEND MAIL

Aggrokatz – An Aggressor Plugin Extension For Cobalt Strike Which Enables Pypykatz To Interface With The Beacons Remotely

aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely. The current version of aggrokatz allows pypykatz to parse LSASS dump files and Registry hive files to extract credentials an...

Continue reading

PowerSploit – A PowerShell Post-Exploitation Framework

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. PowerSploit is comprised of the following modules and scripts:CodeExecutionExecute code on a target machine.Invo...

Continue reading

Pypykatz – Mimikatz Implementation In Pure Python

Mimikatz implementation in pure Python. At least a part of it :)Runs on all OS's which support python>=3.6 WIKISince version 0.1.1 the command line changed a little. Worry not, I have an awesome WIKI for you.InstallingInstall it via pip or by cloni...

Continue reading

Proton Framework – A Windows Post Exploitation Framework Similar To Other Penetration Testing Tools Such As Meterpreter And Powershell Invader Framework

About Proton FrameworkProton Framework is a Windows post exploitation framework similar to other penetration testing tools such as Meterpreter and Powershell Invader Framework. The major difference is that the Proton Framework does most of its operatio...

Continue reading

Lsassy – Extract Credentials From Lsass Remotely

Python library to remotely extract credentials. This blog post explains how it works.You can check the wikiThis library uses impacket project to remotely read necessary bytes in lsass dump and pypykatz to extract credentials.RequirementsPython >= 3....

Continue reading

Spraykatz – A Tool Able To Retrieve Credentials On Windows Machines And Large Active Directory Environments

Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments.It simply tries to procdump machines and parse dumps remotely in order to avoid detections by antivirus softwares as muc...

Continue reading

©2021 By Cyber Sec Labs

   

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account