# mimikittenz **Repository Path**: csharphpython/mimikittenz ## Basic Information - **Project Name**: mimikittenz - **Description**: A post-exploitation powershell tool for extracting juicy info from memory. - **Primary Language**: PowerShell - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-07-17 - **Last Updated**: 2025-05-01 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # mimikittenz **`mimikittenz`** is a post-exploitation powershell tool that utilizes the Windows function **`ReadProcessMemory()`** in order to extract plain-text passwords from various target processes. **`mimikittenz`** can also easily extract other kinds of juicy info from target processes using regex patterns including but not limited to: - TRACK2 (CreditCard) data from merchant/POS processes - PII data - Encryption Keys & All the other goodstuff *note*: This tool is targeting running process memory address space, once a process is killed it's memory 'should' be cleaned up and inaccessible however there are some edge cases in which this does not happen. # Screenshot(s) ![](http://i.imgur.com/SXP84B5.png) # Description The aim of `mimikittenz` is to provide user-level (non-admin privileged) sensitive data extraction in order to maximise post exploitation efforts and increase value of information gathered per target. Currently `mimikittenz` is able to extract the following credentials from memory: #####Webmail##### - Gmail - Office365 - Outlook Web #####Accounting##### - Xero - MYOB #####Remote Access##### - Juniper SSL-VPN - Citrix NetScaler - Remote Desktop Web Access 2012 #####Developement##### - Jira - Github - Bugzilla - Zendesk - Cpanel #####IHateReverseEngineers##### - Malwr - VirusTotal - AnubisLabs #####Misc##### - Dropbox - Microsoft Onedrive - AWS Web Services - Slack - Twitter - Facebook # License https://creativecommons.org/licenses/by/4.0/ # Customization - Custom regex - The syntax for adding custom regex is as follows: `[mimikittenz.MemProcInspector]::AddRegex("","")` - Custom target process - Just append your target proccess name into the array: `[mimikittenz.MemProcInspector]::InspectManyProcs("iexplore","chrome","firefox")` # Contributions I'd love to see the list of regex's and target processe's grow in order to build a comprehensive post-exploitaiton hit list.