Software Alternatives & Reviews

Metasploit VS mimikatz

Compare Metasploit VS mimikatz and see what are their differences

Metasploit logo Metasploit

Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the world's best penetration testing software now.

mimikatz logo mimikatz

It's well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash, pass-the-ticket, build Golden tickets, play with certificates or private keys, vault... maybe make coffee?
  • Metasploit Landing page
    Landing page //
    2023-10-22
  • mimikatz Landing page
    Landing page //
    2023-08-24

Metasploit videos

Metasploit For Beginners - How To Scan And Pwn A Computer | Learn From A Pro Hacker

More videos:

  • Review - Metasploit For Beginners - #1 - The Basics - Modules, Exploits & Payloads
  • Review - Why Don't Hackers Use Metasploit?

mimikatz videos

Empire & Mimikatz Detection by SentinelOne

Category Popularity

0-100% (relative to Metasploit and mimikatz)
Web Application Security
61 61%
39% 39
Security
59 59%
41% 41
Attack Surface Management
Monitoring Tools
0 0%
100% 100

User comments

Share your experience with using Metasploit and mimikatz. For example, how are they different and which one is better?
Log in or Post with

Social recommendations and mentions

Based on our record, mimikatz seems to be more popular. It has been mentiond 14 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Metasploit mentions (0)

We have not tracked any mentions of Metasploit yet. Tracking of Metasploit recommendations started around Oct 2023.

mimikatz mentions (14)

  • Compromising Plaintext Passwords in Active Directory
    Typically, Mimikatz is used to extract NTLM password hashes or Kerberos tickets from memory. However, one of its lesser-known capabilities is the ability to extract plaintext passwords from dumps created for the LSASS process. This means that an attacker can compromise plaintext passwords without running any nefarious code on domain controllers. Dump files can be created interactively or using ProcDump , and in... Source: over 1 year ago
  • How to Detect Pass-the-Ticket Attacks
    Mimikatz can be used to perform pass-the-ticket, but in this post, we wanted to show how to execute the attack using another tool, Rubeus , lets you perform Kerberos based attacks. Rubeus is a C# toolset written by harmj0y and is based on the Kekeo project by Benjamin Delpy, the author of Mimikatz . Source: over 1 year ago
  • What is DCShadow Attack and How to Defend Against It
    What is DCShadow? DCShadow is a command in the Mimikatz tool that enables an adversary to register a rogue domain controller and replicate malicious changes across the domain. Source: over 1 year ago
  • Stealing User Passwords with Mimikatz DCSync
    Mimikatz provides a variety of ways to extract and manipulate credentials, but one of the most alarming is the DCSync command. Using this command, an adversary can simulate the behavior of a domain controller and ask other domain controllers to replicate information — including user password data. In fact, attackers can get any account’s NTLM password hash or even its plaintext password, including the password... Source: over 1 year ago
  • Domain Compromise with a Golden Ticket Attack
    Using Mimikatz , it is possible to leverage the password of the KRBTGT account to create forged Kerberos Ticket Granting Tickets (TGTs) which can be used to request Ticket Granting Server (TGS) tickets for any service on any computer in the domain. Source: over 1 year ago
View more

What are some alternatives?

When comparing Metasploit and mimikatz, you can also consider the following products

Rapid7 - Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the world's best penetration testing software now. DownloadPen testing software to act like an attacker.

Nessus - Nessus Professional is a security platform designed for businesses who want to protect the security of themselves, their clients, and their customers.

ZoomEye - Network mapping service

Exploit Pack - Exploit Pack is an open source project security that will help you adapt exploit codes on-the-fly.

Cobalt Strike - Advanced threat tactics for penetration testers.

Hack The Box - An online platform to test and advance your skills in penetration testing and cyber security.