ad-offensive

Community

Dominate Active Directory environments.

Authornoname300989
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill automates complex and time-consuming Active Directory penetration testing tasks, enabling efficient discovery of vulnerabilities and attack paths within Windows environments.

Core Features & Use Cases

  • Comprehensive Enumeration: Discover users, groups, computers, and GPOs using LDAP.
  • Credential Attack Execution: Perform Kerberoasting, AS-REP Roasting, and DCSync attacks.
  • Lateral Movement & Privilege Escalation: Utilize Pass-the-Hash/Ticket, GPO abuse, and ACL exploitation.
  • Attack Path Visualization: Leverage BloodHound for identifying critical attack paths.
  • Use Case: Assess the security posture of a corporate Active Directory domain by identifying all potential avenues for privilege escalation and lateral movement, from initial reconnaissance to achieving Domain Admin.

Quick Start

Execute an Active Directory offensive testing scan against the domain controller at 192.168.1.10 for the corp.local domain.

Dependency Matrix

Required Modules

python3nmapbloodhoundcrackmapexeckerbruteimpacket

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: ad-offensive
Download link: https://github.com/noname300989/Security-Claw/archive/main.zip#ad-offensive

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.