An open API service indexing awesome lists of open source software.

https://github.com/ADScanPro/adscan

Free Active Directory pentesting tool and Linux CLI for AD enumeration, BloodHound, Kerberoasting, ADCS, DCSync, and attack paths.
https://github.com/ADScanPro/adscan

active-directory active-directory-certificate-services active-directory-exploitation activedirectory adcs adscan bloodhound ctf dcsync enumeration kerberoasting kerberos linux penetration-testing pentest pentest-tool pentesting red-team redteam security-tools

Last synced: 4 days ago
JSON representation

Free Active Directory pentesting tool and Linux CLI for AD enumeration, BloodHound, Kerberoasting, ADCS, DCSync, and attack paths.

Awesome Lists containing this project

README

          

adscan_wordmark_horizontal_transparent_cropped

# ADscan - Active Directory Pentesting CLI

[![Version](https://img.shields.io/badge/version-7.2.0--lite-blue.svg)](https://github.com/ADscanPro/adscan/releases)
[![downloads](https://static.pepy.tech/badge/adscan)](https://pepy.tech/projects/adscan)
[![License: BSL 1.1](https://img.shields.io/badge/license-BSL%201.1-blue.svg)](https://github.com/ADscanPro/adscan/blob/main/LICENSE)
[![Platform](https://img.shields.io/badge/platform-Linux-lightgrey.svg)](https://github.com/ADscanPro/adscan)
[![Discord](https://img.shields.io/discord/1355089867096199300?color=7289da&label=Discord&logo=discord&logoColor=white)](https://discord.com/invite/fXBR3P8H74)

**Free Active Directory pentesting CLI for AD enumeration, BloodHound, Kerberoasting, ADCS, and attack paths.**

ADscan is a free Linux CLI for pentesters, red teamers, and security consultants who need one workflow for Active Directory enumeration, BloodHound collection, Kerberoasting, AS-REP roasting, ADCS checks, password spraying, DCSync, credential dumping, and evidence export.

It is built for real internal Active Directory assessments and labs, so you can go from unauthenticated recon to privilege escalation from one terminal instead of juggling isolated scripts, cheatsheets, and wrappers.

**[Docs](https://adscanpro.com/docs?utm_source=github&utm_medium=readme&utm_campaign=docs_cta)** | [Discord](https://discord.com/invite/fXBR3P8H74) | [Website](https://adscanpro.com)

---

## ๐ŸŽฌ Demo

[![asciicast](https://asciinema.org/a/734180.svg)](https://asciinema.org/a/734180?autoplay=1)

_Auto-pwns **HTB Forest** in ~3 minutes_

---

## ๐Ÿš€ Quick Start

```bash
pipx install adscan
adscan install
adscan start
```

> **Full installation guide & docs** at [adscanpro.com/docs](https://adscanpro.com/docs?utm_source=github&utm_medium=readme&utm_campaign=install_cta)

## ๐ŸŽฏ Why Pentesters Use ADscan

- **Active Directory enumeration from one CLI:** DNS, LDAP, SMB, Kerberos, trust, ADCS, and BloodHound-ready collection in one workflow.
- **Attack execution without tool-hopping:** Kerberoasting, AS-REP roasting, password spraying, GPP, DCSync, and credential workflows stay inside the same workspace.
- **Built for real pentest cadence:** use it in internal AD audits, red team operations, HTB/VulnLab labs, and repeatable attack-path validation.
- **Evidence-first output:** keep domain-scoped workspaces and export TXT/JSON artifacts for reports, retesting, or client handoff.

## โšก Common Active Directory Pentest Workflows

Use ADscan when you need to move quickly through internal Active Directory assessments:

- **CTF and lab auto-pwn:** reproduce HTB Forest, Active, and Cicada attack chains from the docs.
- **Unauthenticated AD recon:** discover domains, DNS, SMB exposure, null sessions, users, and roastable accounts.
- **Authenticated enumeration:** collect LDAP, SMB, Kerberos, ADCS, BloodHound CE data, and credential exposure.
- **Privilege escalation:** execute supported Kerberoasting, AS-REP Roasting, DCSync, GPP password, ADCS, and local credential workflows.
- **Evidence handling:** keep workspaces isolated and export findings to TXT/JSON for reports.

## ๐Ÿงญ Usage Examples

```bash
adscan start
start_unauth
```

More walkthroughs:

- [HTB Forest auto-pwn](https://adscanpro.com/docs/labs/htb/forest?utm_source=github&utm_medium=readme&utm_campaign=ctf_forest)
- [HTB Active walkthrough](https://adscanpro.com/docs/labs/htb/active?utm_source=github&utm_medium=readme&utm_campaign=ctf_active)
- [HTB Cicada walkthrough](https://adscanpro.com/docs/labs/htb/cicada?utm_source=github&utm_medium=readme&utm_campaign=ctf_cicada)

## ๐Ÿงช Developer Setup (uv)

For local development in this repository:

```bash
uv sync --extra dev
uv run adscan --help
uv run adscan version
```

Quality checks:

```bash
uv run ruff check adscan_core adscan_launcher adscan_internal
uv run pytest -m unit
uv run python -m build
```

---

## โœจ Active Directory Attack Coverage

### LITE (Free, Source Available)

**Everything a pentester could do manually, 10x faster:**
- โœ… Three operation modes (automatic/semi-auto/manual)
- โœ… DNS, LDAP, SMB, Kerberos enumeration
- โœ… AS-REP Roasting & Kerberoasting
- โœ… Password spraying
- โœ… BloodHound collection & analysis
- โœ… Credential harvesting (SAM, LSA, DCSync)
- โœ… ADCS detection & template enumeration
- โœ… GPP passwords & CVE enumeration
- โœ… Export to TXT/JSON
- โœ… Workspace & evidence management

### PRO

**What nobody can do manually in reasonable time:**
- ๐ŸŽฏ Algorithmic attack graph generation
- ๐ŸŽฏ Auto-exploitation chains (DNS to DA)
- ๐ŸŽฏ ADCS ESC1-13 auto-exploitation
- ๐ŸŽฏ MITRE-mapped Word/PDF reports
- ๐ŸŽฏ Multi-domain trust spidering
- ๐ŸŽฏ Advanced privilege escalation chains
- ๐ŸŽฏ Priority enterprise support

[Full comparison](https://adscanpro.com/docs/lite-vs-pro) | [Learn more](https://adscanpro.com?utm_source=github&utm_medium=readme&utm_campaign=pro_cta)

---

## ๐Ÿ“‹ Requirements

| | |
|---|---|
| **OS** | Linux (Debian/Ubuntu/Kali) |
| **Docker** | Docker Engine + Compose |
| **Privileges** | `docker` group or `sudo` |
| **Network** | Internet (pull images) + target network |

---

## ๐Ÿ“œ License

Source available under the [Business Source License 1.1](LICENSE).

- **Use freely** for pentesting (personal or paid engagements)
- **Read, modify, and redistribute** the source code
- **Cannot** create a competing commercial product
- **Converts to Apache 2.0** on 2029-02-01

---

## ๐Ÿ’ฌ Community

[![Discord](https://img.shields.io/badge/Discord-Join%20Community-7289da?style=for-the-badge&logo=discord&logoColor=white)](https://discord.com/invite/fXBR3P8H74)
[![GitHub Issues](https://img.shields.io/badge/GitHub-Report%20Bug-black?style=for-the-badge&logo=github)](https://github.com/ADscanPro/adscan/issues)

## ๐Ÿค Contributing

Bug reports, lab reproductions, command-output samples, and focused pull requests are welcome. See [CONTRIBUTING.md](CONTRIBUTING.md) and open an issue with your OS, Docker version, ADscan version, command, and sanitized output.

Enterprise support: [hello@adscanpro.com](mailto:hello@adscanpro.com)

---

(c) 2024-2026 Yeray Martin Dominguez | [adscanpro.com](https://adscanpro.com)