Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/orlyjamie/mimikittenz

A post-exploitation powershell tool for extracting juicy info from memory.
https://github.com/orlyjamie/mimikittenz

Last synced: about 3 hours ago
JSON representation

A post-exploitation powershell tool for extracting juicy info from memory.

Awesome Lists containing this project

README

        

# mimikittenz

**`mimikittenz`** is a post-exploitation powershell tool that utilizes the Windows function **`ReadProcessMemory()`** in order to extract plain-text passwords from various target processes.

**`mimikittenz`** can also easily extract other kinds of juicy info from target processes using regex patterns including but not limited to:

- TRACK2 (CreditCard) data from merchant/POS processes
- PII data
- Encryption Keys & All the other goodstuff

*note*: This tool is targeting running process memory address space, once a process is killed it's memory 'should' be cleaned up and inaccessible however there are some edge cases in which this does not happen.

# Screenshot(s)

![](http://i.imgur.com/SXP84B5.png)

# Description

The aim of `mimikittenz` is to provide user-level (non-admin privileged) sensitive data extraction in order to maximise post exploitation efforts and increase value of information gathered per target.

Currently `mimikittenz` is able to extract the following credentials from memory:

#####Webmail#####

- Gmail
- Office365
- Outlook Web

#####Accounting#####

- Xero
- MYOB

#####Remote Access#####

- Juniper SSL-VPN
- Citrix NetScaler
- Remote Desktop Web Access 2012

#####Development#####

- Jira
- Github
- Bugzilla
- Zendesk
- Cpanel

#####IHateReverseEngineers#####

- Malwr
- VirusTotal
- AnubisLabs

#####Misc#####

- Dropbox
- Microsoft Onedrive
- AWS Web Services
- Slack
- Twitter
- Facebook

# License

https://creativecommons.org/licenses/by/4.0/

# Customization

- Custom regex - The syntax for adding custom regex is as follows:

`[mimikittenz.MemProcInspector]::AddRegex("","")`

- Custom target process - Just append your target process name into the array:

`[mimikittenz.MemProcInspector]::InspectManyProcs("iexplore","chrome","firefox")`
# Contributions

I'd love to see the list of regex's and target processe's grow in order to build a comprehensive post-exploitaiton hit list.