{"id":17994972,"url":"https://github.com/p0dalirius/targetalldomainobjects","last_synced_at":"2025-09-03T17:32:35.471Z","repository":{"id":41381747,"uuid":"459923701","full_name":"p0dalirius/TargetAllDomainObjects","owner":"p0dalirius","description":"A python wrapper to run a command on against all users/computers/DCs of a Windows Domain ","archived":false,"fork":false,"pushed_at":"2022-09-24T16:17:39.000Z","size":293,"stargazers_count":28,"open_issues_count":0,"forks_count":4,"subscribers_count":2,"default_branch":"main","last_synced_at":"2024-12-18T18:45:29.464Z","etag":null,"topics":["active-directory","command","computer","domain","user","wrapper"],"latest_commit_sha":null,"homepage":"https://podalirius.net/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/p0dalirius.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null},"funding":{"github":"p0dalirius","patreon":"Podalirius"}},"created_at":"2022-02-16T08:55:33.000Z","updated_at":"2024-10-02T20:45:49.000Z","dependencies_parsed_at":"2023-01-18T10:45:59.133Z","dependency_job_id":null,"html_url":"https://github.com/p0dalirius/TargetAllDomainObjects","commit_stats":null,"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/p0dalirius%2FTargetAllDomainObjects","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/p0dalirius%2FTargetAllDomainObjects/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/p0dalirius%2FTargetAllDomainObjects/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/p0dalirius%2FTargetAllDomainObjects/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/p0dalirius","download_url":"https://codeload.github.com/p0dalirius/TargetAllDomainObjects/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":231906060,"owners_count":18443920,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["active-directory","command","computer","domain","user","wrapper"],"created_at":"2024-10-29T20:17:22.536Z","updated_at":"2024-12-30T19:34:27.902Z","avatar_url":"https://github.com/p0dalirius.png","language":"Python","readme":"![](./.github/banner.png)\n\n\u003cp align=\"center\"\u003e\n  A python wrapper to run a command on against all users/computers/DCs of a Windows Domain\n  \u003cbr\u003e\n  \u003cimg alt=\"GitHub release (latest by date)\" src=\"https://img.shields.io/github/v/release/p0dalirius/TargetAllDomainObjects\"\u003e\n  \u003ca href=\"https://twitter.com/intent/follow?screen_name=podalirius_\" title=\"Follow\"\u003e\u003cimg src=\"https://img.shields.io/twitter/follow/podalirius_?label=Podalirius\u0026style=social\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://www.youtube.com/c/Podalirius_?sub_confirmation=1\" title=\"Subscribe\"\u003e\u003cimg alt=\"YouTube Channel Subscribers\" src=\"https://img.shields.io/youtube/channel/subscribers/UCF_x5O7CSfr82AfNVTKOv_A?style=social\"\u003e\u003c/a\u003e\n  \u003cbr\u003e\n\u003c/p\u003e\n\n![](.github/example.png)\n\n\n## Features\n\n - [x] Only requires a **low privileges domain user account**.\n - [x] Automatically gets the list of all users/computers/DCs from the domain controller's LDAP.\n - [x] Multithreaded command execution.\n - [x] Saves the output of the commands to a file.\n\n## Usage\n\n```              \n$ ./TargetAllDomainObjects.py -h          \nImpacket v0.9.25.dev1+20220105.151306.10e53952 - Copyright 2021 SecureAuth Corporation\n\nusage: TargetAllDomainObjects.py [-h] -c COMMAND [-ts] [--use-ldaps] [-q] [-debug] [-colors] [-t THREADS] [-o OUTPUT_FILE] --dc-ip ip address [-d DOMAIN]\n                                 [-u USER] [--no-pass | -p PASSWORD | -H [LMHASH:]NTHASH | --aes-key hex key] [-k]\n                                 targetobject\n\nWrapper to run a command on against all users/computers/DCs of a Windows Domain.\n\npositional arguments:\n  targetobject          Target object (user, computer, domaincontroller)\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -c COMMAND, --command COMMAND\n                        Command to launch, with {target} where the target should be placed.\n  -ts                   Adds timestamp to every logging output\n  --use-ldaps           Use LDAPS instead of LDAP\n  -q, --quiet           show no information at all\n  -debug                Debug mode\n  -colors               Colored output mode\n  -t THREADS, --threads THREADS\n                        Number of threads (default: 5)\n  -o OUTPUT_FILE, --output-file OUTPUT_FILE\n                        Output file to store the results in. (default: shares.json)\n\nauthentication \u0026 connection:\n  --dc-ip ip address    IP Address of the domain controller or KDC (Key Distribution Center) for Kerberos. If omitted it will use the domain part (FQDN)\n                        specified in the identity parameter\n  -d DOMAIN, --domain DOMAIN\n                        (FQDN) domain to authenticate to\n  -u USER, --user USER  user to authenticate with\n\n  --no-pass             Don't ask for password (useful for -k)\n  -p PASSWORD, --password PASSWORD\n                        Password to authenticate with\n  -H [LMHASH:]NTHASH, --hashes [LMHASH:]NTHASH\n                        NT/LM hashes, format is LMhash:NThash\n  --aes-key hex key     AES key to use for Kerberos Authentication (128 or 256 bits)\n  -k, --kerberos        Use Kerberos authentication. Grabs credentials from .ccache file (KRB5CCNAME) based on target parameters. If valid credentials\n                        cannot be found, it will use the ones specified in the command line\n                      \n```\n\n## Demo\n\n![](.github/example.png)\n\n## Contributing\n\nPull requests are welcome. Feel free to open an issue if you want to add other features.\n\n","funding_links":["https://github.com/sponsors/p0dalirius","https://patreon.com/Podalirius"],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fp0dalirius%2Ftargetalldomainobjects","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fp0dalirius%2Ftargetalldomainobjects","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fp0dalirius%2Ftargetalldomainobjects/lists"}