-
Hi
I have tried to scan mimikatz (which should be detected by any AV) but unfortunately something is not working:
![image](https://user-images.githubusercontent.com/5778033/115251065-747d5000-…
-
Is this a false positive?
https://www.virustotal.com/gui/file/042d95237bd729a254ef95a62920b4db28a4d3161c0dcfef46029e15286b38f3
Trojan.PSW.Mimikatz.bjm
Trojan.Generic@AI.80 (RDML:NHK6LALpQ
Troj…
-
Bug
I am trying to exetute this command within Mimikatz:
dpapi::chrome /in:"%localappdata%\Google\Chrome\User Data\Defaults\Cookies" /unprotect
So I put it into command field, but Task execu…
-
https://b1n.io/posts/orust-mimikatz-bypass-kaspersky/#%e6%b7%b7%e6%b7%86%e7%89%88rust-mimikatz-bypass%e5%8d%a1%e5%b7%b4%e6%96%af%e5%9f%ba
It seems that this article was also written by you, as mentio…
-
Cool script, but does not bypass / work when you are running a guest privilege level user account.
So basically Mimikatz wont do its workt successfully then (tested on Win10 VM)
-
Hi,
The dcsync module is not parsing correctly the output of Mimikatz, it is sometimes capturing the Security ID instead of the Realm, and the Relative ID instead of the password's hash
![image](h…
-
## Breaching Active Directory
- OSINT and Phishing
- NTLM Authenticated Services--> password spraying attack
- LDAP Bind Credentials--> Create a rogue LDAP server
- Authentication Relays--> Inte…
-
Hello, hoping someone might be able to help with this. When running mimikatz 2.1.1-20181209 on Server 2008 R2 I get the following issue when attempting to start a process with token::run:
```
mim…
-
-
Hi! First of all, awesome workaround! But I wonder how to add other Powershell modules/scripts to this. Can you please give me some brief explantation on how to accomplish this? Do I include it somewh…