A Windows security tool for extracting credentials, hashes, and Kerberos tickets from memory and performing various post-exploitation techniques.
mimikatz is a Windows security tool that extracts authentication credentials like passwords, hashes, and Kerberos tickets from system memory. It enables security professionals to demonstrate vulnerabilities in Windows authentication mechanisms and perform post-exploitation techniques such as pass-the-hash and golden ticket attacks.
Security researchers, penetration testers, red teamers, and system administrators who need to audit Windows security or understand credential exposure risks.
mimikatz provides deep, low-level access to Windows security subsystems that few other tools offer, making it indispensable for realistic security assessments and educational exploration of Windows authentication flaws.
A little tool to play with Windows security
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Extracts plaintext passwords, hashes, PIN codes, and Kerberos tickets from memory, as demonstrated in the README example with sekurlsa::logonpasswords.
Supports pass-the-hash, pass-the-ticket, and golden ticket creation for realistic penetration testing in Active Directory environments, with commands detailed in the quick usage section.
Interacts with Windows cryptographic APIs (CAPI/CNG) and dumps LSA secrets, providing low-level access to core security mechanisms like vault and DCSync.
Builds for x86, x64, and ARM64 architectures, as noted in the build instructions, ensuring broad system support across different Windows versions.
Maintained with continuous integration on AppVeyor and a public wiki, showing ongoing updates and community resources for troubleshooting.
Requires specific versions of Visual Studio or Windows Driver Kit 7.1, and the README mentions potential errors like MSB3073, making setup cumbersome for casual users.
Key resources such as the author's blog are in French, limiting accessibility for non-French speakers despite the English README.
Designed solely for Windows systems, with no support for other operating systems, restricting its use in heterogeneous environments.
As a well-known hacking tool, mimikatz is frequently flagged by security software, reducing its effectiveness in stealthy operations without modification.