attacking-active-directory
CommunityAD security assessment with Kerberoasting.
Education & Research#active-directory#mimikatz#lateral-movement#kerberoasting#dcsync#asreproasting#bloodhound
Authortrilwu
Version1.0.0
Installs0
System Documentation
What problem does it solve?
Automates comprehensive Active Directory security assessments by orchestrating Kerberos-based attacks, credential dumping, and lateral movement to identify misconfigurations and privilege paths.
Core Features & Use Cases
- Kerberos attacks: Kerberoasting and ASREPRoasting to enumerate weak service accounts and credentials.
- Credential dumping and path pivoting: DCSync and Mimikatz-based credential extraction, with lateral movement techniques such as PtH and PtT.
- BloodHound analysis: collect and map relationships to identify shortest attack paths to domain principals.
- Use cases: red-team assessments, AD hardening validation, and privilege-escalation path discovery within Windows domains.
Quick Start
Run an AD security assessment against a Windows domain to enumerate Kerberoastable accounts, dump credentials, and map attack paths.
Dependency Matrix
Required Modules
None requiredComponents
Standard package💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: attacking-active-directory Download link: https://github.com/trilwu/secskills/archive/main.zip#attacking-active-directory Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.