{"id":49353268,"url":"https://github.com/nickvourd/lazaruswakeup","last_synced_at":"2026-04-27T11:01:29.322Z","repository":{"id":350109589,"uuid":"1141916963","full_name":"nickvourd/LazarusWakeUp","owner":"nickvourd","description":"A Python-Based Tool for Reconnaissance and State Management of AD Principals","archived":false,"fork":false,"pushed_at":"2026-04-08T22:28:41.000Z","size":2609,"stargazers_count":25,"open_issues_count":0,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2026-04-09T00:30:26.112Z","etag":null,"topics":["active-directory","microsoft","pentest-tool","poetry-python","python","redteam-tools","redteaming-tools"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/nickvourd.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2026-01-25T16:50:00.000Z","updated_at":"2026-04-08T22:28:45.000Z","dependencies_parsed_at":null,"dependency_job_id":null,"html_url":"https://github.com/nickvourd/LazarusWakeUp","commit_stats":null,"previous_names":["nickvourd/lazaruswakeup"],"tags_count":null,"template":false,"template_full_name":null,"purl":"pkg:github/nickvourd/LazarusWakeUp","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nickvourd%2FLazarusWakeUp","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nickvourd%2FLazarusWakeUp/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nickvourd%2FLazarusWakeUp/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nickvourd%2FLazarusWakeUp/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/nickvourd","download_url":"https://codeload.github.com/nickvourd/LazarusWakeUp/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/nickvourd%2FLazarusWakeUp/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":32333199,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-26T23:26:28.701Z","status":"online","status_checked_at":"2026-04-27T02:00:06.769Z","response_time":128,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["active-directory","microsoft","pentest-tool","poetry-python","python","redteam-tools","redteaming-tools"],"created_at":"2026-04-27T11:01:27.873Z","updated_at":"2026-04-27T11:01:29.282Z","avatar_url":"https://github.com/nickvourd.png","language":"Python","funding_links":[],"categories":[],"sub_categories":[],"readme":"# LazarusWakeUp\n\nA Python-Based Tool for Reconnaissance and State Management of AD Principals.\n\n\u003cp align=\"center\"\u003e\n  \u003cimg width=\"400\" height=\"300\" src=\"/Pictures/logo.png\"\u003e\u003cbr /\u003e\u003cbr /\u003e\n  \u003c!-- \u003cimg alt=\"GitHub License\" src=\"https://img.shields.io/github/license/nickvourd/LazarusWakeUp?style=social\u0026logo=GitHub\u0026logoColor=purple\"\u003e\n  \u003cimg alt=\"GitHub Repo stars\" src=\"https://img.shields.io/github/stars/nickvourd/LazarusWakeUp?logoColor=yellow\"\u003e\u003cbr /\u003e\n  \u003cimg alt=\"GitHub forks\" src=\"https://img.shields.io/github/forks/nickvourd/LazarusWakeUp?logoColor=red\"\u003e\n  \u003cimg alt=\"GitHub watchers\" src=\"https://img.shields.io/github/watchers/nickvourd/LazarusWakeUp?logoColor=blue\"\u003e\n  \u003cimg alt=\"GitHub contributors\" src=\"https://img.shields.io/github/contributors/nickvourd/LazarusWakeUp?style=social\u0026logo=GitHub\u0026logoColor=green\"\u003e --\u003e\n\u003c/p\u003e\n\n## Description\n\nLazarusWakeUp is a Python-based tool for enumerating and managing disabled Active Directory principals. Based on this [research blog](https://medium.com/@nickvourd/the-walking-dead-of-active-directory-1edd33fd7050).\n\n![Static Badge](https://img.shields.io/badge/Python-3.x-green?style=flat\u0026logoSize=auto)\n![Static Badge](https://img.shields.io/badge/Poetry-blue?style=flat\u0026logoSize=auto)\n![Static Badge](https://img.shields.io/badge/Version-1.1%20-red)\n\n\u003e If you find any bugs, don’t hesitate to [report them](https://github.com/nickvourd/LazarusWakeUp/issues). Your feedback is valuable in improving the quality of this project!\n\n## Disclaimer\n\nThe authors and contributors of this project are not liable for any illegal use of the tool. It is intended for educational purposes only. Users are responsible for ensuring lawful usage.\n\n## Table of Contents\n\n- [LazarusWakeUp](#lazaruswakeup)\n  - [Description](#description)\n  - [Disclaimer](#disclaimer)\n  - [Table of Contents](#table-of-contents)\n  - [Acknowledgement](#acknowledgement)\n  - [Installation](#installation)\n  - [Usage](#usage)\n  - [References](#references)\n\n## Acknowledgement\n\nSpecial thanks to my brother [@kavasilo](https://x.com/kavasilo), who provided invaluable assistance during the development proceess of this tool.\n\nLazarusWakeUp was created with :heart: by [@nickvourd](https://x.com/nickvourd).\n\n## Installation\n\n⚠️ Please ensure that Poetry is installed on your system.\n\n1) Clone the repository by executing the following command:\n\n```\ngit clone https://github.com/nickvourd/LazarusWakeUp.git\n```\n\n2) Once the repository is cloned, navigate into the LazarusWakeUp directory:\n\n```\ncd LazarusWakeUp\n```\n\n3) Install dependencies with Poetry:\n\n```\npoetry install\n```\n\n4) Verify installation:\n\n```\npoetry run lazarus-wakeup --help\n```\n\n## Usage\n\n```\n██╗      █████╗ ███████╗ █████╗ ██████╗ ██╗   ██╗███████╗    ██╗    ██╗ █████╗ ██╗  ██╗███████╗   ██╗   ██╗██████╗ \n██║     ██╔══██╗╚══███╔╝██╔══██╗██╔══██╗██║   ██║██╔════╝    ██║    ██║██╔══██╗██║ ██╔╝██╔════╝   ██║   ██║██╔══██╗\n██║     ███████║  ███╔╝ ███████║██████╔╝██║   ██║███████╗    ██║ █╗ ██║███████║█████╔╝ █████╗     ██║   ██║██████╔╝\n██║     ██╔══██║ ███╔╝  ██╔══██║██╔══██╗██║   ██║╚════██║    ██║███╗██║██╔══██║██╔═██╗ ██╔══╝     ██║   ██║██╔═══╝ \n███████╗██║  ██║███████╗██║  ██║██║  ██║╚██████╔╝███████║    ╚███╔███╔╝██║  ██║██║  ██╗███████╗   ╚██████╔╝██║     \n╚══════╝╚═╝  ╚═╝╚══════╝╚═╝  ╚═╝╚═╝  ╚═╝ ╚═════╝ ╚══════╝     ╚══╝╚══╝ ╚═╝  ╚═╝╚═╝  ╚═╝╚══════╝    ╚═════╝ ╚═╝   \n\n~ Created with \u003c3 by @nickvourd and @kavasilo\n\nLazarusWakeUp - Find, enable/disable, and analyze disabled AD principals\n\noptions:\n  -h, --help            show this help message and exit\n  -a, --action {enable,disable,find,find-all}\n                        Action to operate on disabled accounts\n  --use-ldaps           Use LDAPS instead of LDAP\n  --use-schannel        Use LDAP Schannel (TLS) for certificate-based authentication\n  -v, --verbose         verbosity level (-v for verbose, -vv for debug)\n  --force               Skip confirmation prompts (for batch operations)\n  --port PORT           Custom LDAP port (default: 389 or 636 for LDAPS)\n\nauthentication \u0026 connection:\n  --dc-ip ip address    IP Address of the domain controller or KDC (Key Distribution Center) for Kerberos. If omitted it will use the domain part (FQDN) specified in the identity\n                        parameter\n  -d, --domain DOMAIN   (FQDN) domain to authenticate to\n  -u, --user USER       user to authenticate with\n  -crt, --certfile CERTFILE\n                        Path to the user certificate (PEM format) for Schannel authentication\n  -key, --keyfile KEYFILE\n                        Path to the user private key (PEM format) for Schannel authentication\n  -td, --target-domain TARGET_DOMAIN\n                        Target domain (if different than the domain of the authenticating user)\n  --no-pass             don't ask for password (useful for -k)\n  -p, --password PASSWORD\n                        password to authenticate with\n  -H, --hashes [LMHASH:]NTHASH\n                        NT/LM hashes, format is LMhash:NThash\n  --aes-key hex key     AES key to use for Kerberos Authentication (128 or 256 bits)\n  -k, --kerberos        Use Kerberos authentication. Grabs credentials from .ccache file (KRB5CCNAME) based on target parameters. If valid credentials cannot be found, it will use the\n                        ones specified in the command line\n\narguments when setting -action to find, enable or disable:\n  -t, --target TARGET_SAMNAME\n                        Target account (required for find, enable, disable)\n  -tl, --target-list TARGET_SAMNAME_LIST\n                        Path to a file with target accounts names (one per line)\n\nExamples:\n  # Find all disabled users and computers (with relationship analysis)\n  lazarus-wakeup -d CORP.LOCAL -u administrator -p Password123 -a find-all\n\n  # Find specific disabled user\n  lazarus-wakeup -d CORP.LOCAL -u admin -p Pass123 -a find -t jdoe\n\n  # Find multiple specific disabled users from file\n  lazarus-wakeup -d CORP.LOCAL -u admin -p Pass123 -a find -tl disabled_users.txt\n\n  # Enable a disabled user\n  lazarus-wakeup -d CORP.LOCAL -u admin -p Pass123 -a enable -t jdoe\n\n  # Enable multiple users from file\n  lazarus-wakeup -d CORP.LOCAL -u admin -p Pass123 -a enable -tl targets.txt --force\n\n  # Disable a user\n  lazarus-wakeup -d CORP.LOCAL -u admin -p Pass123 -a disable -t jdoe\n\n  # Use NTLM hash\n  lazarus-wakeup -d CORP.LOCAL -u admin -H :a87f3a337d73085c45f9416be5787d86 -a find-all\n\n  # Use Kerberos\n  lazarus-wakeup -d CORP.LOCAL -u admin -p Pass123 -k -a find-all\n\n  # Use LDAPS\n  lazarus-wakeup -d CORP.LOCAL -u admin -p Pass123 --use-ldaps -a find-all\n\nNote: \n  - Guest and krbtgt accounts are automatically excluded from all operations\n  - find requires -t or -tl to specify targets\n  - find-all searches all disabled objects without requiring targets\n  - Both find and find-all automatically analyze inbound relationships\n```\n\n## References\n\n- [DACL by The Hacker Recipes](https://www.thehacker.recipes/ad/movement/dacl/)\n- [An ACE Up the Sleeve by SpecterOps](https://specterops.io/wp-content/uploads/sites/3/2022/06/an_ace_up_the_sleeve.pdf)\n\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnickvourd%2Flazaruswakeup","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fnickvourd%2Flazaruswakeup","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnickvourd%2Flazaruswakeup/lists"}