kerbrute

Community

Enumerate AD users & spray passwords

AuthorAeonDave
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill automates the enumeration of valid Active Directory usernames and performs password spraying attacks against them, helping to identify weak credentials and discover valid accounts stealthily.

Core Features & Use Cases

  • User Enumeration: Identifies valid AD usernames by leveraging Kerberos pre-authentication errors, which are less likely to trigger standard authentication logging.
  • Password Spraying: Efficiently tests a single password against a list of discovered usernames to find accounts with common or weak passwords.
  • Brute-Force: Attempts to brute-force the password for a specific user or a list of user:password pairs.
  • AS-REP Roasting: Can extract Kerberos ticket granting ticket (TGT) requests for users who do not require pre-authentication, enabling offline password cracking.

Quick Start

Use the kerbrute skill to enumerate valid usernames from the file 'users.txt' in the 'corp.local' domain, targeting the domain controller at '10.10.10.1'.

Dependency Matrix

Required Modules

None required

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: kerbrute
Download link: https://github.com/AeonDave/malskill/archive/main.zip#kerbrute

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.