Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/orlyjamie/mimikittenz
A post-exploitation powershell tool for extracting juicy info from memory.
https://github.com/orlyjamie/mimikittenz
Last synced: about 3 hours ago
JSON representation
A post-exploitation powershell tool for extracting juicy info from memory.
- Host: GitHub
- URL: https://github.com/orlyjamie/mimikittenz
- Owner: orlyjamie
- Created: 2016-07-04T13:57:18.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2024-06-28T11:10:03.000Z (6 months ago)
- Last Synced: 2024-10-29T15:38:04.135Z (about 1 month ago)
- Language: PowerShell
- Size: 10.7 KB
- Stars: 1,833
- Watchers: 104
- Forks: 333
- Open Issues: 9
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-rainmana - orlyjamie/mimikittenz - A post-exploitation powershell tool for extracting juicy info from memory. (PowerShell)
README
# mimikittenz
**`mimikittenz`** is a post-exploitation powershell tool that utilizes the Windows function **`ReadProcessMemory()`** in order to extract plain-text passwords from various target processes.
**`mimikittenz`** can also easily extract other kinds of juicy info from target processes using regex patterns including but not limited to:
- TRACK2 (CreditCard) data from merchant/POS processes
- PII data
- Encryption Keys & All the other goodstuff*note*: This tool is targeting running process memory address space, once a process is killed it's memory 'should' be cleaned up and inaccessible however there are some edge cases in which this does not happen.
# Screenshot(s)
![](http://i.imgur.com/SXP84B5.png)
# Description
The aim of `mimikittenz` is to provide user-level (non-admin privileged) sensitive data extraction in order to maximise post exploitation efforts and increase value of information gathered per target.
Currently `mimikittenz` is able to extract the following credentials from memory:
#####Webmail#####
- Gmail
- Office365
- Outlook Web#####Accounting#####
- Xero
- MYOB#####Remote Access#####
- Juniper SSL-VPN
- Citrix NetScaler
- Remote Desktop Web Access 2012#####Development#####
- Jira
- Github
- Bugzilla
- Zendesk
- Cpanel#####IHateReverseEngineers#####
- Malwr
- VirusTotal
- AnubisLabs#####Misc#####
- Dropbox
- Microsoft Onedrive
- AWS Web Services
- Slack# License
https://creativecommons.org/licenses/by/4.0/
# Customization
- Custom regex - The syntax for adding custom regex is as follows:
`[mimikittenz.MemProcInspector]::AddRegex("","")`
- Custom target process - Just append your target process name into the array:
`[mimikittenz.MemProcInspector]::InspectManyProcs("iexplore","chrome","firefox")`
# ContributionsI'd love to see the list of regex's and target processe's grow in order to build a comprehensive post-exploitaiton hit list.