Red Team — Active Directory
CommunityMaster Active Directory for Red Team operations.
Software Engineering#penetration testing#exploitation#cybersecurity#privilege escalation#red team#kerberos#active directory
Authordefconxt
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill provides a comprehensive playbook for offensive security operations targeting Active Directory environments, enabling efficient discovery, exploitation, and privilege escalation.
Core Features & Use Cases
- Attack Playbooks: Detailed commands and strategies for Kerberoasting, AS-REP Roasting, DCSync, NTLM relay, ADCS exploitation, and more.
- Enumeration & Reconnaissance: Tools and techniques for gathering information on users, groups, and domain structure.
- Privilege Escalation: Methods for escalating privileges within an Active Directory environment.
- Use Case: A penetration tester needs to identify and exploit vulnerabilities in a client's Active Directory. This Skill provides the exact commands to find misconfigurations, extract credentials, and move laterally to gain domain administrator access.
Quick Start
Use the red-team-active-directory skill to enumerate all users in the domain 'corp.local' using SMB null sessions.
Dependency Matrix
Required Modules
None requiredComponents
references
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: Red Team — Active Directory Download link: https://github.com/defconxt/CIPHER/archive/main.zip#red-team-active-directory Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.