{"id":13577400,"url":"https://github.com/safebuffer/vulnerable-AD","last_synced_at":"2025-04-05T11:32:42.366Z","repository":{"id":37057431,"uuid":"273454836","full_name":"safebuffer/vulnerable-AD","owner":"safebuffer","description":"Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab ","archived":false,"fork":false,"pushed_at":"2024-04-12T18:06:21.000Z","size":31,"stargazers_count":2038,"open_issues_count":11,"forks_count":393,"subscribers_count":45,"default_branch":"master","last_synced_at":"2025-01-12T19:51:38.474Z","etag":null,"topics":["active-directory","penetration-testing","powershell","redteaming","vulnerable-activedirectory","vulnerable-ad"],"latest_commit_sha":null,"homepage":"","language":"PowerShell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/safebuffer.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"github":"wazehell","patreon":"wazehell"}},"created_at":"2020-06-19T09:30:18.000Z","updated_at":"2025-01-10T16:40:26.000Z","dependencies_parsed_at":"2024-07-16T08:04:56.069Z","dependency_job_id":"ebabf240-bcb3-4e73-a85a-9cc2f383d94a","html_url":"https://github.com/safebuffer/vulnerable-AD","commit_stats":null,"previous_names":["safebuffer/vulnerable-ad","wazehell/vulnerable-ad"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/safebuffer%2Fvulnerable-AD","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/safebuffer%2Fvulnerable-AD/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/safebuffer%2Fvulnerable-AD/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/safebuffer%2Fvulnerable-AD/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/safebuffer","download_url":"https://codeload.github.com/safebuffer/vulnerable-AD/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247331702,"owners_count":20921843,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["active-directory","penetration-testing","powershell","redteaming","vulnerable-activedirectory","vulnerable-ad"],"created_at":"2024-08-01T15:01:21.110Z","updated_at":"2025-04-05T11:32:42.088Z","avatar_url":"https://github.com/safebuffer.png","language":"PowerShell","funding_links":["https://github.com/sponsors/wazehell","https://patreon.com/wazehell"],"categories":["PowerShell"],"sub_categories":[],"readme":"\u003ch1 align=\"center\"\u003e\n  Vulnerable-AD\n  \u003cbr\u003e\n\u003c/h1\u003e\n\nCreate a vulnerable active directory that's allowing you to test most of active directory attacks in local lab\n\n### Main Features\n- Randomize Attacks\n- Full Coverage of the mentioned attacks\n- you need run the script in DC with Active Directory installed \n- Some of attacks require client workstation\n  \n### Supported Attacks\n- Abusing ACLs/ACEs\n- Kerberoasting\n- AS-REP Roasting\n- Abuse DnsAdmins\n- Password in Object Description\n- User Objects With Default password (Changeme123!)\n- Password Spraying\n- DCSync\n- Silver Ticket\n- Golden Ticket \n- Pass-the-Hash\n- Pass-the-Ticket\n- SMB Signing Disabled\n\n### Example\n```powershell\n# if you didn't install Active Directory yet , you can try \nInstall-windowsfeature AD-domain-services\nImport-Module ADDSDeployment\nInstall-ADDSForest -CreateDnsDelegation:$false -DatabasePath \"C:\\\\Windows\\\\NTDS\" -DomainMode \"7\" -DomainName \"cs.org\" -DomainNetbiosName \"cs\" -ForestMode \"7\" -InstallDns:$true -LogPath \"C:\\\\Windows\\\\NTDS\" -NoRebootOnCompletion:$false -SysvolPath \"C:\\\\Windows\\\\SYSVOL\" -Force:$true\n# if you already installed Active Directory, just run the script !\nIEX((new-object net.webclient).downloadstring(\"https://raw.githubusercontent.com/wazehell/vulnerable-AD/master/vulnad.ps1\"));\nInvoke-VulnAD -UsersLimit 100 -DomainName \"cs.org\"\n```\n\n### TODO\n- Play with workstations !\n- Click close issue button on github\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsafebuffer%2Fvulnerable-AD","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fsafebuffer%2Fvulnerable-AD","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsafebuffer%2Fvulnerable-AD/lists"}