ad-offensive
CommunityDominate Active Directory environments.
Software Engineering#penetration testing#red team#kerberoasting#dcsync#bloodhound#windows security#active directory
Authornoname300989
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill automates complex and time-consuming Active Directory penetration testing tasks, enabling efficient discovery of vulnerabilities and attack paths within Windows environments.
Core Features & Use Cases
- Comprehensive Enumeration: Discover users, groups, computers, and GPOs using LDAP.
- Credential Attack Execution: Perform Kerberoasting, AS-REP Roasting, and DCSync attacks.
- Lateral Movement & Privilege Escalation: Utilize Pass-the-Hash/Ticket, GPO abuse, and ACL exploitation.
- Attack Path Visualization: Leverage BloodHound for identifying critical attack paths.
- Use Case: Assess the security posture of a corporate Active Directory domain by identifying all potential avenues for privilege escalation and lateral movement, from initial reconnaissance to achieving Domain Admin.
Quick Start
Execute an Active Directory offensive testing scan against the domain controller at 192.168.1.10 for the corp.local domain.
Dependency Matrix
Required Modules
python3nmapbloodhoundcrackmapexeckerbruteimpacket
Components
scriptsreferences
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: ad-offensive Download link: https://github.com/noname300989/Security-Claw/archive/main.zip#ad-offensive Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.