tools.thehacker.recipes Open in urlscan Pro
172.64.147.209  Public Scan

Submitted URL: http://tools.thehacker.recipes/
Effective URL: https://tools.thehacker.recipes/
Submission: On June 28 via api from US — Scanned from ES

Form analysis 0 forms found in the DOM

Text Content

THE HACKER TOOLS

GitHub Twitter The Hacker Recipes

SearchCtrl + K
 * Introduction
 * Mimikatz 🥝
    * General 🛠️
    * Modules
       * crypto
          * capi
          * certificates
          * certtohw
          * cng
          * extract
          * hash
          * keys
          * kutil 🛠️
          * providers
          * sc
          * scauth 🛠️
          * stores
          * system
          * tpminfo
      
       * dpapi
          * blob
          * cache
          * capi
          * chrome
          * cloudapkd 🛠️
          * cloudapreg
          * cng
          * create 🛠️
          * cred
          * credhist
          * luna
          * masterkey
          * protect
          * ps
          * rdg
          * sccm
          * ssh
          * tpm
          * vault
          * wifi
          * wwan
      
       * event
          * clear
          * drop
      
       * kerberos
          * ask
          * clist
          * golden
          * hash
          * list
          * ptc
          * ptt
          * purge
          * tgt
      
       * lsadump
          * backupkeys
          * cache
          * changentlm
          * dcshadow
          * dcsync
          * mbc
          * netsync
          * lsa
          * packages
          * postzerologon
          * rpdata
          * sam
          * secrets
          * setntlm
          * trust
          * zerologon
      
       * misc
          * aadcookie
          * clip
          * compress
          * cmd
          * detours
          * easyntlmchall
          * efs
          * lock
          * memssp
          * mflt
          * ncroutemon
          * ngcsign
          * printnightmare
          * regedit
          * sccm
          * shadowcopies
          * skeleton
          * spooler
          * taskmgr
          * wp
          * xor
      
       * net
          * alias
          * deleg
          * group
          * if
          * serverinfo
          * session
          * share
          * stats
          * tod
          * trust
          * user
          * wsession
      
       * privilege
          * backup
          * debug
          * driver
          * id
          * name
          * restore
          * security
          * sysenv
          * tcb
      
       * process
          * exports
          * imports
          * list
          * resume
          * run
          * runp
          * start
          * stop
          * suspend
      
       * rpc
          * close
          * connect
          * enum
          * server
      
       * sekurlsa
          * backupkeys
          * bootkey
          * cloudap
          * credman
          * dpapi
          * dpapisystem
          * ekeys
          * kerberos
          * krbtgt
          * livessp
          * logonpasswords
          * minidump
          * msv
          * process
          * pth
          * ssp
          * tickets
          * trust
          * tspkg
          * wdigest
      
       * service
          * -
          * +
          * preshutdown
          * remove
          * resume
          * shutdown
          * start
          * stop
          * suspend
      
       * sid
          * add
          * clear
          * lookup
          * modify
          * patch
          * query
      
       * standard
          * answer
          * base64
          * cd
          * cls
          * coffee
          * exit
          * hostname
          * localtime
          * log
          * sleep
          * version
      
       * token
          * elevate
          * list
          * revert
          * run
          * whoami
      
       * ts
          * logonpasswords
          * mstsc
          * multirdp
          * remote
          * sessions
      
       * vault
          * cred
          * list

 * 🛠️Impacket
    * Library
       * SMB
       * LDAP
       * MSRPC
       * NTLM
       * Kerberos
   
    * Script examples
       * addcomputer.py
       * atexec.py
       * dcomexec.py
       * dpapi.py
       * esentutl.py
       * exchanger.py
       * findDelegation.py
       * GetADUsers.py
       * getArch.py
       * Get-GPPPassword.py
       * GetNPUsers.py
       * getPac.py
       * getST.py
       * getTGT.py
       * GetUserSPNs.py
       * goldenPac.py
       * karmaSMB.py
       * kintercept.py
       * lookupsid.py
       * mimikatz.py
       * mqtt_check.py
       * mssqlclient.py
       * mssqlinstance.py
       * netview.py
       * nmapAnswerMachine.py
       * ntfs-read.py
       * ntlmrelayx.py
       * ping.py
       * ping6.py
       * psexec.py
       * raiseChild.py
       * rdp_check.py
       * reg.py
       * registry-read.py
       * rpcdump.py
       * rpcmap.py
       * sambaPipe.py
       * samrdump.py
       * secretsdump.py
       * services.py
       * smbclient.py
       * smbexec.py
       * smbpasswd.py
       * smbrelayx.py
       * smbserver.py
       * sniff.py
       * sniffer.py
       * split.py
       * ticketConverter.py
       * ticketer.py
       * wmiexec.py
       * wmipersist.py
       * wmiquery.py

 * CrackMapExec
 * BloodHound
 * Rubeus
 * Exegol
 * PowerSploit
 * Hashcat
    * for Active Directory
    * Official docs

Powered by GitBook


INTRODUCTION

This project is part of The Hacker Recipes and is a work in progress. I started
it in 2021 and have absolutely no idea when this could be finished (will it ever
be?).

The Hacker Tools is focused on documenting and giving tips & tricks on common
infosec tools

The 🛠️ emoji is used where work has to be done.

This project is aimed at providing technical guides on various hacking tools.

Keep in mind that these guides are maintained by non-omniscient security
enthusiasts in their spare time. You will probably find things missing or
mistakes.

📣 Please feel free to contribute, give feedback/suggestions or reach out to me
on Twitter (@_nwodtuhs), Discord (Shutdown#2539), IRL or whatever you feel
appropriate.

Almost every tool mentioned in theses notes is installed, and sometimes
pre-configured, in Exegol, another project of mine of a docker environment ready
to hack on day-to-day engagements. It's not much but I use it on all my
engagements. Feel free to use it, to contribute, to give feedback etc.

NextMimikatz 🥝

Last updated 9 months ago

On this page