Loading...
Open source application for retrieving passwords stored on a local computer with support for various software and platforms.

Open source application for retrieving passwords stored on a local computer with support for various software and platforms.
The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software. This project has been added to pupy as a post-exploitation module. Python code will be interpreted in memory without touching the disk and it works on Windows and Linux host. Standalones are now available here: https://github.com/AlessandroZ/LaZagne/releases/ Installation: pip install -r requirements.txt Usage: - Launch all modules: laZagne.exe all - Launch only a specific module: laZagne.exe browsers - Launch only a specific software script: laZagne.exe browsers -firefox - Write all passwords found into a file (-oN for Normal txt, -oJ for Json, -oA for All). Note: If you have problems to parse JSON results written as multi-line strings, check this. - Get help: laZagne.exe -h - Change verbosity mode (2 different levels): laZag
Common questions about LaZagne Project including features, pricing, alternatives, and user reviews.
LaZagne Project is Open source application for retrieving passwords stored on a local computer with support for various software and platforms.. It is a Security Operations solution designed to help security teams with Post Exploitation, Linux, Password Cracking.
A proof-of-concept Node.js tool that demonstrates automated MFA bypass techniques for Microsoft Outlook accounts using browser automation.
An open-source framework that enables building and deploying AI-powered security automation tools for both offensive and defensive cybersecurity operations using over 300 AI models.
FourCore ATTACK is an adversary emulation platform to manage cyber risk with evidence
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
CrossC2 is a cross-platform payload generator that extends CobaltStrike's capabilities to Linux and macOS environments for red team operations.
Get strategic cybersecurity insights in your inbox