credential-dumping
OfficialExtract AD credentials with precision.
Authorblacklanternsecurity
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill automates the extraction of sensitive credentials from Active Directory and related systems, crucial for understanding an organization's security posture and identifying potential attack paths.
Core Features & Use Cases
- Comprehensive Credential Extraction: Supports DCSync, NTDS.dit, SAM hive dumps, Azure AD Connect credentials, LAPS passwords, gMSA passwords, and DSRM credentials.
- Secure Workflow: Prioritizes Kerberos-first authentication for remote operations to minimize detection.
- Use Case: A penetration tester needs to obtain domain hashes to move laterally within a compromised network. This Skill can extract the krbtgt hash via DCSync or retrieve local administrator passwords from LAPS-managed systems.
Quick Start
Use the credential-dumping skill to extract all domain hashes via DCSync from the domain controller at DC.DOMAIN.LOCAL.
Dependency Matrix
Required Modules
secretsdump.pymimikatznetexecbloodyADgMSADumpersqlcmd
Components
scriptsreferences
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: credential-dumping Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#credential-dumping Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.