Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here’s the plan. We create a way to automate doing the sticky keys windows hack from a bootable USB which we can call as WinPirate. Then, we automate getting as many saved passwords as possible, drop a listener, and delete all traces that we were there.
All without being detected by antivirus. We should add a mimikittenz option if the computer was found running and unlocked, otherwise we can just run it later remotely.
Requirements : a linux bootable USB, this repo on the USB (not in the OS, just put it in the root directory)
Note : chromepasswords.py requires PyWin32
If the computer is locked:
sudo -i
fdisk -l
(note: if you’re on Kali Linux, run parted -l
)mkdir /media/windows
mount /dev/WHATEVERTHEWINDOWSPARTITIONWASCALLED /media/windows -t ntfs
If the computer isn’t locked:
cd to the USB and run Run.bat (this will run WinPirate.bat silently in the background, it should be done in < 10 seconds
python chromepasswords.py -csv
and it will decrypt the Chrome saved passwords database and export it as a CSVGraphRunner is a powerful post-exploitation toolset designed for interacting with the Microsoft Graph API, enabling…
NailaoLoader employs sophisticated techniques to obscure its execution flow, leveraging Windows Management Instrumentation (WMI) for…
The CVE-2025-21333 Proof of Concept (PoC) demonstrates an exploit targeting a vulnerability in the vkrnlintvsp.sys…
PowerShell has emerged as a vital tool in Digital Forensics and Incident Response (DFIR), offering…
Brainstorm is an innovative web fuzzing tool that integrates traditional fuzzing techniques with AI-powered insights,…
Vulnerability research is a critical aspect of cybersecurity that focuses on identifying, analyzing, and documenting…