From 16c36eb669e2e88fabbb306bacc231e2c2695fc3 Mon Sep 17 00:00:00 2001 From: Ulf Frisk Date: Sun, 17 Mar 2019 22:37:31 +0100 Subject: [PATCH] Update README.md --- README.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/README.md b/README.md index f93d2e5..f6300c9 100644 --- a/README.md +++ b/README.md @@ -11,6 +11,7 @@ Tamas Jos ([@skelsec](https://twitter.com/SkelSec)) , info@skelsec.com , https:/ #### Overview: _pypykatz_ for MemProcFS exposes mimikatz functionality in the folder `/py/secrets/` in the file system root provided that the target is a supported Windows system. Functionality includes retrieval of hashes, passwords, kerberos tickets and various other credentials. +

#### Installation instructions: 1) Ensure MemProcFS supported version of 64-bit Python for Windows is on the system path (or specify in `-pythonpath` option when starting MemProcFS). NB! embedded Python will not work with _pypykatz_ since it requires access to Python pip installed packages. @@ -18,7 +19,4 @@ _pypykatz_ for MemProcFS exposes mimikatz functionality in the folder `/py/secre 3) Copy the _pypykatz_ for _MemProcFS_ plugin by copying all files from [`/files/plugins/pym_pypykatz`](https://github.com/ufrisk/MemProcFS-plugins/tree/master/files/plugins/pym_pypykatz) to corresponding folder in MemProcFS - overwriting any existing files there. 4) Start MemProcFS. -#### Functionality: -

- #### Last updated: 2019-03-17