From 30533bc18abbaea1216f369b3868bbe45864ae42 Mon Sep 17 00:00:00 2001 From: Pedro Gabaldon <34518201+PeterGabaldon@users.noreply.github.com> Date: Tue, 23 Jan 2024 22:45:43 +0100 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 87c67f8..7d4319a 100644 --- a/README.md +++ b/README.md @@ -6,7 +6,7 @@ ![Windows](https://img.shields.io/badge/Windows-0078D6?style=for-the-badge&logo=windows&logoColor=white) [!["Buy Me A Coffee"](https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png)](https://www.buymeacoffee.com/petergabaldon) - +a # WhatAboutSAM WhatAboutSAM is my custom Windows SAM dumper, reading it from the registry. So, SYSTEM privileges are needed. I wanted to study at a low level how Windows stores local user credentials in the Security Account Manager (SAM). As a Cybersecurity Engineer with a mostly offensive mindset, I have used many times the tools we all know: mimikatz, secretsdump (impacket), pwdump, hashdump (metasploit), crackmapexec (--sam parameter), LaZAgne...