mimikatz
CommunityHarvest Windows credentials and pivot.
AuthorAeonDave
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill automates the process of extracting sensitive credential information from Windows systems, enabling post-exploitation activities and network pivoting.
Core Features & Use Cases
- Credential Dumping: Extract plaintext passwords, NTLM hashes, and Kerberos tickets from LSASS memory.
- Post-Exploitation: Facilitate Pass-the-Hash, Pass-the-Ticket, and Golden/Silver Ticket attacks.
- Use Case: After gaining initial access to a Windows machine, use Mimikatz to dump credentials, allowing you to move laterally within the network using harvested hashes or tickets.
Quick Start
Execute mimikatz to debug privileges and dump logon passwords from LSASS.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: mimikatz Download link: https://github.com/AeonDave/malskill/archive/main.zip#mimikatz Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.