LaZagne Project Logo

LaZagne Project

0
Free
Visit Website

The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software. This project has been added to pupy as a post-exploitation module. Python code will be interpreted in memory without touching the disk and it works on Windows and Linux host. Standalones are now available here: https://github.com/AlessandroZ/LaZagne/releases/ Installation: pip install -r requirements.txt Usage: - Launch all modules: laZagne.exe all - Launch only a specific module: laZagne.exe browsers - Launch only a specific software script: laZagne.exe browsers -firefox - Write all passwords found into a file (-oN for Normal txt, -oJ for Json, -oA for All). Note: If you have problems to parse JSON results written as multi-line strings, check this. - Get help: laZagne.exe -h - Change verbosity mode (2 different levels): laZag

FEATURES

ALTERNATIVES

A Python script for creating a cohesive and up-to-date penetration testing framework.

A free online wargame for practicing hacking skills and learning security concepts.

Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

A scripting engine for interacting with GraphQL endpoints for pentesting purposes.

A cross-platform web fuzzer written in Nim

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

A post-exploitation framework designed to operate covertly on heavily monitored environments.

Adversary emulation framework for testing security measures in network environments.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved