Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/AidenPearce369/ADReaper
A fast enumeration tool for Windows Active Directory Pentesting written in Go
https://github.com/AidenPearce369/ADReaper
Last synced: 21 days ago
JSON representation
A fast enumeration tool for Windows Active Directory Pentesting written in Go
- Host: GitHub
- URL: https://github.com/AidenPearce369/ADReaper
- Owner: AidenPearce369
- Created: 2022-03-01T17:41:22.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2023-01-14T15:01:36.000Z (almost 2 years ago)
- Last Synced: 2024-08-05T17:29:45.297Z (4 months ago)
- Language: Go
- Size: 40 KB
- Stars: 276
- Watchers: 8
- Forks: 40
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - AidenPearce369/ADReaper - A fast enumeration tool for Windows Active Directory Pentesting written in Go (Go)
README
# ADReaper
```ADReaper``` is a tool written in ```Golang``` which enumerates an Active Directory environment with LDAP queries within few seconds
## Installation
You can download precompiled executable binaries for Windows/Linux from [latest releases](https://github.com/AidenPearce369/ADReaper/releases/tag/ADReaper)
### Install from source
To build from source, clone the repo and build it with GO
```c
$ git clone https://github.com/AidenPearce369/ADReaper
$ cd ADReaper/
$ go build
```## Usage
ADReaper performs enumeration with various commands that performs LDAP queries with respective to it
```c
PS C:\Users\redteamer\Desktop\shared> .\ADReaper.exe-command string
Command to run
dc - to list domain controllers
domain-trust - to list domain trust
users - to list all users
computers - to list all computers
groups - to list all groups with members
spn - to list service principal objects
never-loggedon - to list users never logged on
gpo - to list group policy objects
ou - to list organizational units
ms-sql - to list MS-SQL servers
asreproast - to list AS-REP roastable accounts
unconstrained - to list Unconstrained Delegated accounts
admin-priv - to list AD objects with admin privilege-dc string
Enter the DC
-filter string
Filters to use for users/groups/computers
list - lists all objects only
full-data - list all objects with properties
membership - lists all members from an object(default "list")
-name stringPass object name of user/group/computer
-password string
Enter the Password
-user string
Enter the Username
```To query the properties of ```Domain Controller``` of the domain,
```c
.\ADReaper.exe -dc -user -password -command dc
```To query the ```Trust Attributes``` of the domain,
```c
.\ADReaper.exe -dc -user -password -command domain-trust
```To list all ```Users``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command users
```To list all ```Users``` with attributes from the domain,
```c
.\ADReaper.exe -dc -user -password -command users -filter full-data
```To list attributes of ```Specific Users``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command users -name
```To list the membership of the Specific User,
```c
.\ADReaper.exe -dc -user -password -command users -name -filter membership
```To list all available ```Computers``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command computers
```To list all ```Computers``` with attributes from the domain,
```c
.\ADReaper.exe -dc -user -password -command computers -filter full-data
```To list attributes of ```Specific Computer``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command computers -name
```To list all available ```Groups``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command groups
```To list all ```Groups``` with attributes from the domain,
```c
.\ADReaper.exe -dc -user -password -command groups -filter full-data
```To list attributes of ```Specific Group``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command groups -name
```To list members of ```Specific Group``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command groups -name -filter membership
```To list users ```Never Logged On``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command never-loggedon
```To list ```GPOs``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command gpo
```To list ```OUs``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command ou
```To list AD objects with higher privileges,
```c
.\ADReaper.exe -dc -user -password -command admin-priv
```To list ```MS-SQL Servers``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command ms-sql
```To list all attributes of ```MS-SQL Servers``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command ms-sql -filter full-data
```To list all attributes of specific ```MS-SQL Server``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command ms-sql -name
```To list ```SPNs``` available in the domain,
```c
.\ADReaper.exe -dc -user -password -command spn
```To list all attributes of ```Specific SPN``` from the domain,
```c
.\ADReaper.exe -dc -user -password -command spn -name
```To list AD objects with ```Unconstrained Delegation``` enabled,
```c
.\ADReaper.exe -dc -user -password -command unconstrained
```## To-Do
Looking forward for contributors to build the next version
Planned features,
- Custom LDAP querying
- Filters LDAP attributes with existing commands
- LAPS enumeration
- Kerberoasting SPNs
- AS-REP Roasting SPNs
- Local admin access hunting
- ACL enumeration
- Exporting JSON data for BloodHoundIf interested, ping me :)