LaZagne Project Logo

LaZagne Project

0
Free
Visit Website

The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software. This project has been added to pupy as a post-exploitation module. Python code will be interpreted in memory without touching the disk and it works on Windows and Linux host. Standalones are now available here: https://github.com/AlessandroZ/LaZagne/releases/ Installation: pip install -r requirements.txt Usage: - Launch all modules: laZagne.exe all - Launch only a specific module: laZagne.exe browsers - Launch only a specific software script: laZagne.exe browsers -firefox - Write all passwords found into a file (-oN for Normal txt, -oJ for Json, -oA for All). Note: If you have problems to parse JSON results written as multi-line strings, check this. - Get help: laZagne.exe -h - Change verbosity mode (2 different levels): laZag

FEATURES

ALTERNATIVES

A post-exploitation tool for pentesting Active Directory

Interactive online malware sandbox for real-time analysis and threat intelligence

Back-end component for red team operations with crucial design considerations.

Find RCE gadgets for CTF pwn challenges with ease.

A penetration testing tool that focuses on web browser exploitation

A YARA interactive debugger for the YARA language written in Rust, providing features like function calls, constant evaluation, and string matching.

The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.

A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement