https://github.com/mordavid/dcsynchound
This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)
https://github.com/mordavid/dcsynchound
active-directory activedirectory activedirectoryassesssment activedirectorysecurity bloodhound bloodhound-pentest-tool bloodhound-setup bloodhound-tutorial dcsync
Last synced: 11 months ago
JSON representation
This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)
- Host: GitHub
- URL: https://github.com/mordavid/dcsynchound
- Owner: MorDavid
- Created: 2024-03-08T17:34:27.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2025-03-17T00:24:49.000Z (about 1 year ago)
- Last Synced: 2025-05-18T22:13:22.134Z (12 months ago)
- Topics: active-directory, activedirectory, activedirectoryassesssment, activedirectorysecurity, bloodhound, bloodhound-pentest-tool, bloodhound-setup, bloodhound-tutorial, dcsync
- Language: Python
- Homepage: https://www.MORDAVID.com
- Size: 196 KB
- Stars: 47
- Watchers: 3
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
README
## Stay Updated on Telegram (RootSec - Cyber Write ups & Tools)
[https://t.me/root_sec](https://t.me/root_sec)
# DCSyncHound
DCSyncHound is a cyber-security tool designed to assist in protecting your Active Directory environment against potential threats and unauthorized access.\
This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...) and Hashcat's results and combine them into a single Excel file (xlsx) and load the details to your bloodhound.\
\

## NEW FEATURE: Data Loading to Bloodhound Database
Loading NTLMs and plain-text password to your Bloodhound database.\
*It's cool feature but you must take care and protect your bloodhound.*\
\

## Usage
```
Usage: DCSyncHound.py [-h] [--dburi DATABASEURI] [-u DATABASEUSER] [-p DATABASEPASSWORD] -d DOMAIN -f FILE_LOAD -t DCSYNC_TYPE -c FILE_CRACK -o OUTPUT_FILE [-b] [-v]
DCSyncHound - This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...) and Hashcat's results and combine them into a single Excel file (xlsx)
optional arguments:
-h, --help show this help message and exit
--dburi DATABASEURI Database URI
-u DATABASEUSER, --dbuser DATABASEUSER
Database user
-p DATABASEPASSWORD, --dbpassword DATABASEPASSWORD
Database password
-d DOMAIN, --domain DOMAIN
Domain Name (example: lab.local)
-f FILE_LOAD, --file FILE_LOAD
DCSync Output file
-t DCSYNC_TYPE, --type DCSYNC_TYPE
Options: Mimikatz,Secretsdump,SharpKatz. Note: If you use mimikatz you need flags of /csv /all
-c FILE_CRACK, --hashcat FILE_CRACK
Hashcat Output file
-o OUTPUT_FILE, --output OUTPUT_FILE
Output file
-b, --bloodhound Data Loading to Bloodhound Database
-v, --verbose Verbose mode
```
## License
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
