Spraykatz - retrieve credentials on Windows machines


Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments. It simply tries to procdump machines and parse dumps remotely in order to avoid detections by antivirus softwares as much as possible. Installation This tool is written for python>=3. Do not use this on production environments! Ubuntu On a fresh updated Ubuntu: apt update apt install -y python3.6 python3-pip git nmap git clone --recurse-submodules https://github.com/aas-n/spraykatz.git cd spraykatz pip3 install -r requirements.txt Using Spraykatz A quick start could be: ./spraykatz.py -u H4x0r -p L0c4L4dm1n -t Mandatory arguments Switches Description -u, --username User to spray with. He must have admin rights on targeted systems in order to gain remote code execution. -p, --password User's password or NTLM hash in the LM:NT format. -t, --targets IP addresses and/or IP address ranges. You can submit them via a file of targets (one target per....

December 23, 2019
Notify of
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.