Active Directory Auditing and Enumeration
-
Updated
Dec 3, 2025 - PowerShell
Active Directory Auditing and Enumeration
Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD domain.
An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD domain. Evades EDR detections through ADWS.
Centralized Active Directory Auditing Tool
Next-Generation Password Audit Tool for Windows Machines
This script will scan your AD and Export a CSV list of Pcs that have not had activity, prior to your set number of days tolerance you input.
Complete PowerShell toolkit to audit, detect backdoors, and clean orphaned AdminSDHolder (AdminCount=1) accounts. Language-agnostic using Well-Known SIDs. Works on any Active Directory.
Automates Kerberos and realm setup by editing /etc/hosts, syncing time with the DC, and configuring krb5.conf. Ideal for AD pentests.
ADAIO is a standalone Active Directory enumeration tool focused on identifying privilege escalation and attack paths.
Gather information from Active Directory via ADWS and generate detailed security reports to assist pentesters and security teams.
This lab focuses on configuring Active Directory Domain Services (AD DS) in a Windows Server environment. Tasks included promoting a domain controller, managing users and organizational units (OUs), and configuring Group Policy Objects (GPOs) for centralized administration.
Add a description, image, and links to the active-directory-audit topic page so that developers can more easily learn about it.
To associate your repository with the active-directory-audit topic, visit your repo's landing page and select "manage topics."