![]() ![]() ![]() This can be done with mimikatz via the crypto::capi command. If keys are marked as not exportable then you will have to patch CAPI to allow export of non-exportable keys in the current process. Optionally, you may specify a password with the -password argument. If you export a certificate with a private key as PFX then the password will be blank by default. And DO obfuscate it with a tool like ConfuserEx, just in case. DO NOT run it in memory on target WITHOUT AMSI BYPASSED. This tool is flagged as malware by Defender. Useful for red team operations where you need to poach a certificate for pivoting purposes and want to do so with an in-memory post-ex payload. ![]() NET tool for stealing and importing certificates in the Windows certificate store without touching disk. Sole purpose is to detect the user's bitcoin wallet and change it to the malicious bitcoin wallet Quite basic so all trolls allowed.A (v3.5 compatible). This is a P.O.C bitcoin stealer strictly for educational purposes written in C# purely. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |