The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software. This project has been added to pupy as a post-exploitation module. Python code will be interpreted in memory without touching the disk and it works on Windows and Linux host. Standalones are now available here: https://github.com/AlessandroZ/LaZagne/releases/ Installation: pip install -r requirements.txt Usage: - Launch all modules: laZagne.exe all - Launch only a specific module: laZagne.exe browsers - Launch only a specific software script: laZagne.exe browsers -firefox - Write all passwords found into a file (-oN for Normal txt, -oJ for Json, -oA for All). Note: If you have problems to parse JSON results written as multi-line strings, check this. - Get help: laZagne.exe -h - Change verbosity mode (2 different levels): laZag
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A DNS rebinding attack framework for security researchers and penetration testers.
A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks
A Python-based educational network hacking toolkit that implements various attack techniques including ARP poisoning, DHCP attacks, subdomain enumeration, and web technology identification.
A suite of tools for Wi-Fi network security assessment and penetration testing.
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.
A reconnaissance tool that retrieves information from Office 365 and Azure Active Directory using a valid credential.
Mortar is an evasion technique to defeat and divert detection and prevention of security products, including AV, EDR, and XDR solutions.
Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.