Parses BRC4 dcsync output, correlates it with BloodHound users JSON data, and generates the equivalent secretsdump.py output that's ingestible with Hashcat
# Usage of ./brc4dcsyncparser:
-bloodhound-users string
Path to the BloodHound users JSON file. Can be retrieved via: MATCH (u:User) RETURN u
-brc4-dcsync string
Path to the raw BRC4 dcsync data file
-output string
Path to the output file (default "parsed-dcsync.ntds")