Credentials
R4t stores authentication credentials in its SQLite database. Multiple credential types are supported — passwords, NT hashes, Kerberos ccache files, PFX certificates, PEM certificate+key pairs, and AES keys. A single credential can be set as the active default for all commands.The creds Command
Subcommands
creds add
Add a credential to the database.
Flags for creds add
| Flag | Description |
|---|---|
-u, --username | Username or UPN |
-p, --password | Cleartext password |
--hash | NT hash (LM:NT or just NT) |
--pfx | Path to PFX certificate file |
--pfx-password | PFX passphrase |
--cert | Path to PEM certificate |
--key | Path to PEM private key |
--ccache | Path to Kerberos ccache file |
--aes | AES-128 or AES-256 key |
-d, --domain | Domain the credential belongs to |
--hostname | Machine account hostname (e.g., DC01$) |
--source | How the credential was obtained |
--notes | Operator notes |
PFX files are copied into ~/.local/share/r4t/files/pfx/ and the stored path is updated to the local copy.
creds list
List all stored credentials.
--auth to reveal them.
creds set
Set a credential as the active default. The active credential is stored in Badger (cfg:credentials) and used automatically by all commands.
creds list.
creds modify
Modify an existing stored credential.
Flags for creds modify
| Flag | Description |
|---|---|
-u, --username | New username |
-d, --domain | New domain |
--notes | New notes |
creds remove
Remove a credential from the database.
How Credentials Are Resolved
When a command needs to authenticate, R4t resolves credentials in this priority order:- Inline flags —
--username,--password,--hash,--ccache,--pfx,--cert+--key,--aes,--anonymous --credential-idflag — use a specific stored credential by ID- Active credential — the credential set via
creds set(retrieved from Badger) - Anonymous — unauthenticated if no credential is available (where supported)
r4t creds set 1, all subsequent commands authenticate with that credential automatically.
Credential Data Model
Supported Authentication Methods
| Method | Required Fields | Use Case |
|---|---|---|
| Password | name, password, domain | Standard AD authentication |
| NT Hash | name, hash, domain | Pass-the-Hash (LDAP, SMB, etc.) |
| PFX Certificate | name, pfx_file, pfx_password, domain | PKINIT, Schannel |
| PEM Cert + Key | name, cert_file, key_file, domain | PKINIT, Schannel |
| Kerberos ccache | name, ccache_file, domain | Pass-the-Ticket |
| AES Key | name, aes_key, domain | Kerberos with AES key |
| Anonymous | — | Unauthenticated operations |
| Shadow (Key only) | key_file, domain | Shadow credential attacks |
Using Credentials Inline
If you don’t want to store credentials, you can pass them inline on any command:Kerberos Ticket Storage
Kerberos TGTs and TGSs obtained during a session can be stored in the database:| Table | Description |
|---|---|
tgts | Ticket Granting Tickets |
tgss | Ticket Granting Service tickets |
r4t tickets to manage saved Kerberos tickets.
