PCredz icon indicating copy to clipboard operation
PCredz copied to clipboard

This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.

Results 12 PCredz issues
Sort by recently updated
recently updated
newest added

Added a dockerfile to the tool. - Useful for managing python dependencies and versioning - Also used to parse large pcaps on the host instead of exfiltrating off the host

I am trying to test #47 on a not Kali box, but I cannot get PCredz to even run due to it claiming libpcap is not installed. I attempted previous...

On my penetration tests, I often run into issues where my own systems' authentication requests are collected. Whenever I perform AD password spraying and forget to disable PCredz, my PCredz...

I was analyzing some traffic I captured and it kept crashing on one particular file. The python traceback showed me what was happening. I just wrapped the decode in a...

We are [reviewing](https://linuxsecurity.expert/tools/pcredz/) your tool and had some challenges finding the license. Can you put up a license file?

I am not used to using Linux, what should I do to use it on windows.

Greetings, First of all, thank you for this tool. Do you think it would be possible to modify the logfile location ? or make it customisable ? The current location...

It looks like the Dockerfile is named dockerfile with a lowercase "d". Docker is case-sensitive, and it expects the file to be named exactly Dockerfile with an uppercase "D". To...

In very rare cases when the Seconds variable(lines 795 and 811) is exactly equal to 60 seconds, no 'parsed in: N seconds/minutes' message will be shown. You can verify this...