credential-dumping

Official

Extract AD credentials with precision.

Authorblacklanternsecurity
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill automates the extraction of sensitive credentials from Active Directory and related systems, crucial for understanding an organization's security posture and identifying potential attack paths.

Core Features & Use Cases

  • Comprehensive Credential Extraction: Supports DCSync, NTDS.dit, SAM hive dumps, Azure AD Connect credentials, LAPS passwords, gMSA passwords, and DSRM credentials.
  • Secure Workflow: Prioritizes Kerberos-first authentication for remote operations to minimize detection.
  • Use Case: A penetration tester needs to obtain domain hashes to move laterally within a compromised network. This Skill can extract the krbtgt hash via DCSync or retrieve local administrator passwords from LAPS-managed systems.

Quick Start

Use the credential-dumping skill to extract all domain hashes via DCSync from the domain controller at DC.DOMAIN.LOCAL.

Dependency Matrix

Required Modules

secretsdump.pymimikatznetexecbloodyADgMSADumpersqlcmd

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: credential-dumping
Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#credential-dumping

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.