mimikatz

Community

Harvest Windows credentials and pivot.

AuthorAeonDave
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill automates the process of extracting sensitive credential information from Windows systems, enabling post-exploitation activities and network pivoting.

Core Features & Use Cases

  • Credential Dumping: Extract plaintext passwords, NTLM hashes, and Kerberos tickets from LSASS memory.
  • Post-Exploitation: Facilitate Pass-the-Hash, Pass-the-Ticket, and Golden/Silver Ticket attacks.
  • Use Case: After gaining initial access to a Windows machine, use Mimikatz to dump credentials, allowing you to move laterally within the network using harvested hashes or tickets.

Quick Start

Execute mimikatz to debug privileges and dump logon passwords from LSASS.

Dependency Matrix

Required Modules

None required

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: mimikatz
Download link: https://github.com/AeonDave/malskill/archive/main.zip#mimikatz

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.