pysecdump | based tool to dump security information
kandi X-RAY | pysecdump Summary
kandi X-RAY | pysecdump Summary
pysecdump is a Python library. pysecdump has low support. However pysecdump has 5 bugs, it has 16 vulnerabilities, it build file is not available and it has a Non-SPDX License. You can download it from GitHub.
pysecdump is a python tool to extract various credentials and secrets from running Windows systems. It currently extracts: * LM and NT hashes (SYSKEY protected) * Cached domain passwords * LSA secrets * Secrets from Credential Manager (only some). pysecdump can also: * Impersonate other processes - if you want a shell as another user * Enable currently held windows privileges - see "whoami /priv". It does exactly the same sort of things already implemented by gsecdump, Cain & Abel, metasploit and many other tools. This implementation is in python and that’s probably the only notable thing about this implementation. If you think python is cool, this project might be of interest. If you don’t, you should probably stop reading now.
pysecdump is a python tool to extract various credentials and secrets from running Windows systems. It currently extracts: * LM and NT hashes (SYSKEY protected) * Cached domain passwords * LSA secrets * Secrets from Credential Manager (only some). pysecdump can also: * Impersonate other processes - if you want a shell as another user * Enable currently held windows privileges - see "whoami /priv". It does exactly the same sort of things already implemented by gsecdump, Cain & Abel, metasploit and many other tools. This implementation is in python and that’s probably the only notable thing about this implementation. If you think python is cool, this project might be of interest. If you don’t, you should probably stop reading now.
Support
Quality
Security
License
Reuse
Support
pysecdump has a low active ecosystem.
It has 177 star(s) with 48 fork(s). There are 24 watchers for this library.
It had no major release in the last 6 months.
There are 0 open issues and 1 have been closed. On average issues are closed in 129 days. There are 1 open pull requests and 0 closed requests.
It has a neutral sentiment in the developer community.
The latest version of pysecdump is current.
Quality
pysecdump has 5 bugs (3 blocker, 0 critical, 2 major, 0 minor) and 421 code smells.
Security
pysecdump has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
pysecdump code analysis shows 16 unresolved vulnerabilities (9 blocker, 7 critical, 0 major, 0 minor).
There are 6 security hotspots that need review.
License
pysecdump has a Non-SPDX License.
Non-SPDX licenses can be open source with a non SPDX compliant license, or non open source licenses, and you need to review them closely before use.
Reuse
pysecdump releases are not available. You will need to build from source code and install.
pysecdump has no build file. You will be need to create the build yourself to build the component from source.
pysecdump saves you 3051 person hours of effort in developing the same functionality from scratch.
It has 6574 lines of code, 383 functions and 41 files.
It has high code complexity. Code complexity directly impacts maintainability of the code.
Top functions reviewed by kandi - BETA
kandi has reviewed pysecdump and discovered the below as its top functions. This is intended to give you an instant insight into pysecdump implemented functionality, and help decide if they suit your requirements.
- Return a text representation of the object
- Open the process descriptor
- Returns a list of all loaded modules
- Returns the mhs module
- Return a text representation of this Token
- Get the fully qualified name of the domain
- Get domain name
- Get the name of the account
- Get all processes
- Find process by PID
- Determine if the window is a fixed drive
- Check if user has permission
- Get effective privileges
- Resolve permissions
- Get dangerous permissions
- Return the document as a text string
- Returns the token impersonation level
- Get a list of services
- Return a text representation of the ace
- Returns the names of all group members of the group
- Yield all file hashes
- Return a text representation of this share
- Determine if this node is trusted
- Return a text representation of the thread
- Return the document as HTML
- Render this issue
Get all kandi verified functions for this library.
pysecdump Key Features
No Key Features are available at this moment for pysecdump.
pysecdump Examples and Code Snippets
No Code Snippets are available at this moment for pysecdump.
Community Discussions
No Community Discussions are available at this moment for pysecdump.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install pysecdump
You can download it from GitHub.
You can use pysecdump like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
You can use pysecdump like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page