from core import HackingTool
from core import HackingToolsCollection
class BloodHound(HackingTool):
TITLE = "BloodHound (AD Attack Paths)"
DESCRIPTION = "Uses graph theory to reveal hidden attack paths in Active Directory/Azure environments."
INSTALL_COMMANDS = [
"pip install --user bloodhound",
"sudo apt-get install -y neo4j",
]
RUN_COMMANDS = ["bloodhound-python --help"]
PROJECT_URL = "https://github.com/BloodHoundAD/BloodHound"
SUPPORTED_OS = ["linux", "macos"]
class NetExec(HackingTool):
TITLE = "NetExec — nxc (Network Pentesting)"
DESCRIPTION = "Swiss army knife for pentesting Windows/AD networks. Successor to CrackMapExec."
INSTALL_COMMANDS = ["pip install --user netexec"]
RUN_COMMANDS = ["nxc --help"]
PROJECT_URL = "https://github.com/Pennyw0rth/NetExec"
SUPPORTED_OS = ["linux", "macos"]
class Impacket(HackingTool):
TITLE = "Impacket (Network Protocol Tools)"
DESCRIPTION = "Python classes for working with SMB, MSRPC, Kerberos, LDAP, and more."
INSTALL_COMMANDS = ["pip install --user impacket"]
RUN_COMMANDS = ["impacket-smbclient --help"]
PROJECT_URL = "https://github.com/fortra/impacket"
SUPPORTED_OS = ["linux", "macos"]
class Responder(HackingTool):
TITLE = "Responder (LLMNR/NBT-NS Poisoner)"
DESCRIPTION = "LLMNR/NBT-NS/MDNS poisoner with rogue authentication servers for credential capture."
INSTALL_COMMANDS = ["git clone https://github.com/lgandx/Responder.git"]
RUN_COMMANDS = ["cd Responder && sudo python3 Responder.py --help"]
PROJECT_URL = "https://github.com/lgandx/Responder"
SUPPORTED_OS = ["linux"]
class Certipy(HackingTool):
TITLE = "Certipy (AD Certificate Abuse)"
DESCRIPTION = "Active Directory Certificate Services enumeration and abuse tool."
INSTALL_COMMANDS = ["pip install --user certipy-ad"]
RUN_COMMANDS = ["certipy --help"]
PROJECT_URL = "https://github.com/ly4k/Certipy"
SUPPORTED_OS = ["linux", "macos"]
class Kerbrute(HackingTool):
TITLE = "Kerbrute (Kerberos Brute Force)"
DESCRIPTION = "Kerberos pre-auth brute-forcer for username enumeration and password spraying."
REQUIRES_GO = True
INSTALL_COMMANDS = [
"go install github.com/ropnop/kerbrute@latest",
]
RUN_COMMANDS = ["kerbrute --help"]
PROJECT_URL = "https://github.com/ropnop/kerbrute"
SUPPORTED_OS = ["linux", "macos"]
class ActiveDirectoryTools(HackingToolsCollection):
TITLE = "Active Directory Tools"
DESCRIPTION = "Tools for AD enumeration, attack path discovery, and credential attacks."
TOOLS = [
BloodHound(),
NetExec(),
Impacket(),
Responder(),
Certipy(),
Kerbrute(),
]