LaZagne Project Logo

LaZagne Project

0
Free
Updated 11 March 2025
Visit Website

The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software. This project has been added to pupy as a post-exploitation module. Python code will be interpreted in memory without touching the disk and it works on Windows and Linux host. Standalones are now available here: https://github.com/AlessandroZ/LaZagne/releases/ Installation: pip install -r requirements.txt Usage: - Launch all modules: laZagne.exe all - Launch only a specific module: laZagne.exe browsers - Launch only a specific software script: laZagne.exe browsers -firefox - Write all passwords found into a file (-oN for Normal txt, -oJ for Json, -oA for All). Note: If you have problems to parse JSON results written as multi-line strings, check this. - Get help: laZagne.exe -h - Change verbosity mode (2 different levels): laZag

FEATURES

SIMILAR TOOLS

A DNS rebinding attack framework for security researchers and penetration testers.

A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

A Python-based educational network hacking toolkit that implements various attack techniques including ARP poisoning, DHCP attacks, subdomain enumeration, and web technology identification.

A suite of tools for Wi-Fi network security assessment and penetration testing.

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

A reconnaissance tool that retrieves information from Office 365 and Azure Active Directory using a valid credential.

Mortar is an evasion technique to defeat and divert detection and prevention of security products, including AV, EDR, and XDR solutions.

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

A CRLF and open redirect fuzzer

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved