Credential Dumping via Pypykatz

Requirements
Via PIP
Via Github

That's all!
<-Lsass Dumping->

<-Live Token Dump->

Resources I used:
PreviousDictionary Attack via HashCatNextExploiting the Shellshock Vulnerability and Protecting Yourself against It
Last updated