windows-credential-harvesting
OfficialUncover Windows credentials
Software Engineering#privilege escalation#windows#credential harvesting#mimikatz#dpapi#password hunting
Authorblacklanternsecurity
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps security professionals discover and extract locally stored credentials on Windows systems, aiding in privilege escalation and lateral movement during authorized penetration tests.
Core Features & Use Cases
- Local Credential Discovery: Finds saved passwords in browsers, registry, command history, and DPAPI-protected stores.
- Exploitation Techniques: Leverages tools like Mimikatz, SharpDPAPI, and others to decrypt or extract sensitive information.
- Use Case: During a penetration test, an analyst can use this Skill to find cached Wi-Fi passwords or saved browser credentials on a compromised Windows host to gain access to other systems or user accounts.
Quick Start
Run the windows-credential-harvesting skill to find saved Wi-Fi passwords on the target system.
Dependency Matrix
Required Modules
None requiredComponents
scripts
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: windows-credential-harvesting Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#windows-credential-harvesting Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.