Software Alternatives & Reviews

Tsunami VS mimikatz

Compare Tsunami VS mimikatz and see what are their differences

Tsunami logo Tsunami

A general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence

mimikatz logo mimikatz

It's well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash, pass-the-ticket, build Golden tickets, play with certificates or private keys, vault... maybe make coffee?
  • Tsunami Landing page
    Landing page //
    2023-07-25
  • mimikatz Landing page
    Landing page //
    2023-08-24

Tsunami videos

Tsunami Evict Review - All Sizes - Inside and out - The good and the bad

More videos:

  • Review - Tsunami Shield 6 Months Later Honest Review
  • Review - Tsunami Slow Pitch Rod Review

mimikatz videos

Empire & Mimikatz Detection by SentinelOne

Category Popularity

0-100% (relative to Tsunami and mimikatz)
Monitoring Tools
45 45%
55% 55
Security
41 41%
59% 59
Web Application Security
38 38%
62% 62
Vulnerability Scanner
100 100%
0% 0

User comments

Share your experience with using Tsunami and mimikatz. For example, how are they different and which one is better?
Log in or Post with

Social recommendations and mentions

Based on our record, mimikatz should be more popular than Tsunami. It has been mentiond 14 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Tsunami mentions (3)

  • Log4j RCE Found
    Https://github.com/google/tsunami-security-scanner (I bet it would be easy to write a plugin for https://github.com/projectdiscovery/nuclei as well.) To see if there are injection points statically, I work on a tool (https://github.com/returntocorp/semgrep) that someone else already wrote a check with: https://twitter.com/lapt0r/status/1469096944047779845 or look for the mitigation with `semgrep -e... - Source: Hacker News / over 2 years ago
  • Security and self-hosting, bumping a 7 months old thread
    Thanks to you I just reenabled Tsunami https://github.com/google/tsunami-security-scanner. Also had software called something like vuln (blue logo with a yellow eye in the middle) running. But the hard disk of the server died --sadly and I can't remember how it was called.-- https://vuls.io/. Source: over 2 years ago
  • Awesome Penetration Testing
    Tsunami - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. - Source: dev.to / over 2 years ago

mimikatz mentions (14)

  • Compromising Plaintext Passwords in Active Directory
    Typically, Mimikatz is used to extract NTLM password hashes or Kerberos tickets from memory. However, one of its lesser-known capabilities is the ability to extract plaintext passwords from dumps created for the LSASS process. This means that an attacker can compromise plaintext passwords without running any nefarious code on domain controllers. Dump files can be created interactively or using ProcDump , and in... Source: over 1 year ago
  • How to Detect Pass-the-Ticket Attacks
    Mimikatz can be used to perform pass-the-ticket, but in this post, we wanted to show how to execute the attack using another tool, Rubeus , lets you perform Kerberos based attacks. Rubeus is a C# toolset written by harmj0y and is based on the Kekeo project by Benjamin Delpy, the author of Mimikatz . Source: over 1 year ago
  • What is DCShadow Attack and How to Defend Against It
    What is DCShadow? DCShadow is a command in the Mimikatz tool that enables an adversary to register a rogue domain controller and replicate malicious changes across the domain. Source: over 1 year ago
  • Stealing User Passwords with Mimikatz DCSync
    Mimikatz provides a variety of ways to extract and manipulate credentials, but one of the most alarming is the DCSync command. Using this command, an adversary can simulate the behavior of a domain controller and ask other domain controllers to replicate information — including user password data. In fact, attackers can get any account’s NTLM password hash or even its plaintext password, including the password... Source: over 1 year ago
  • Domain Compromise with a Golden Ticket Attack
    Using Mimikatz , it is possible to leverage the password of the KRBTGT account to create forged Kerberos Ticket Granting Tickets (TGTs) which can be used to request Ticket Granting Server (TGS) tickets for any service on any computer in the domain. Source: over 1 year ago
View more

What are some alternatives?

When comparing Tsunami and mimikatz, you can also consider the following products

Nessus - Nessus Professional is a security platform designed for businesses who want to protect the security of themselves, their clients, and their customers.

Rapid7 - Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the world's best penetration testing software now. DownloadPen testing software to act like an attacker.

OpenVAS - The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools...

ZoomEye - Network mapping service

Exploit Pack - Exploit Pack is an open source project security that will help you adapt exploit codes on-the-fly.

Microsoft Baseline Security Analyzer - A vulnerability scanner for the Windows WorkStations et Servers !