Credentials, keys, and persistence from disk images and memory dumps. SAM, NTDS.dit, LSA, DPAPI, browsers, SSH, cloud, LSASS. Raw, E01, VMDK with NTFS and ext4.
$ abyss image evidence.E01 --creds [SAM] Administrator:500:aad3b...:31d6c... [SAM] backup_svc:1001:aad3b...:8846f... [NTDS] jsmith:1105:aad3b...:e02bc... [NTDS] admin:500:aad3b...:fc525... [LSA] _SC_SQLService: P@ssw0rd123! [DCC2] $DCC2$10240#jsmith#a8f2e... [BROWSER] Chrome: admin@corp.com / hunter2 42 findings | 3 partitions | 2.1s
SAM hashes, NTDS.dit domain dumps, LSA secrets, browser passwords, SSH keys, cloud credentials, and LSASS memory extraction.
SAM hashes, NTDS.dit domain dumps with PEK v2/v3, LSA secrets, cached domain credentials (DCC2), DPAPI master keys. Hashcat-ready output.
Chromium saved passwords via DPAPI decryption. Firefox via key4.db + logins.json. Master password detection and skip.
LSASS minidump credential extraction. MSV1_0/NTLM credential packages. Wdigest plaintext credential scanning.
Port forwarding, multi-hop chain relay, and proxychains-compatible SOCKS5 proxy server.
Raw sector dumps, E01 (EnCase), and VMDK (VMware sparse). Auto-detected by header magic. MBR and GPT partition tables. NTFS and ext2/3/4 filesystems.
Windows services, BootExecute entries, Image File Execution Options debugger hijacks. Offline analysis of autoruns.
Full offline analysis on Linux and Windows. 14 finding types across disk, memory, and credential sources.
Disk Image to Container to Volume to Filesystem to Extractors to Findings to Output. 13 crates with single responsibilities.
Auto-detect Raw, E01, or VMDK by header magic. Parse segment tables and provide a unified block-level read interface.
MBR/GPT partition enumeration. NTFS MFT walking and ext4 inode traversal. File extraction by path or pattern.
Registry hive parsing, ESE database (NTDS.dit), crypto decryption (SAM, LSA, DPAPI), browser DB, memory dump analysis.
14 finding types with discriminated union. Text (colored), JSON (line-delimited), Hashcat (mode auto-detect) formatters.
Single Rust binary. Build and start extracting credentials in under a minute.
$ git clone https://github.com/Real-Fruit-Snacks/Abyss.git $ cd Abyss && cargo build --release # Static binary for target deployment $ ./target/release/abyss --help abyss 0.1.0