If you like this project, consider purchasing licenses of OctoPwn, our full pentesting suite that runs in your browser!
For notifications on new builds/releases and other info, hop on to our Discord
Extract registry and NTDS secrets from local or remote disk images
This project, alongside with many other pentester tools runs in the browser with the power of OctoPwn!
Check out the community version at OctoPwn - Live
git clone then pip install .
First you MUST manually install adiskreader project from here as it is not yet packaged on pip.
after install you'll get adiskreacer-secretsdump. Just use adiskreacer-secretsdump <url>
The command line argument of this tool has the same format as the adiskreader-console.
Examples:
adiskreader-secretsdump smb+ntlm-password://TEST\victim@10.10.10.2/sharename/foldername/disk.vhdx
adiskreader-secretsdump ssh+password+vhd://test:test@10.10.10.3/mnt/hgfs/vhdxtest/17763.737.amd64fre.rs5_release_svc_refresh.190906-2324_server_serverdatacentereval_en-us_1.vhd