Description
The aim of
mimikittenz
is to provide user-level (non-admin privileged) sensitive data extraction in order to maximise post exploitation efforts and increase value of information gathered per target.Currently
mimikittenz
is able to extract the following credentials from memory:Webmail
- Gmail
- Office365
- Outlook Web
Accounting
- Xero
- MYOB
Remote Access
- Juniper SSL-VPN
- Citrix NetScaler
- Remote Desktop Web Access 2012
Developement
- Jira
- Github
- Bugzilla
- Zendesk
- Cpanel
IHateReverseEngineers
- Malwr
- VirusTotal
- AnubisLabs
Misc
- Dropbox
- Microsoft Onedrive
- AWS Web Services
- Slack
Customization
- Custom regex – The syntax for adding custom regex is as follows:
[mimikittenz.MemProcInspector]::AddRegex("<NameOfTarget>","<regex_here>")
- Custom target process – Just append your target proccess name into the array:
$matches=[mimikittenz.MemProcInspector]::InspectManyProcs("iexplore","chrome","firefox")
Comments