Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Z4nzu
GitHub Repository: Z4nzu/hackingtool
Path: blob/master/tools/active_directory.py
2371 views
1
from core import HackingTool
2
from core import HackingToolsCollection
3
4
5
class BloodHound(HackingTool):
6
TITLE = "BloodHound (AD Attack Paths)"
7
DESCRIPTION = "Uses graph theory to reveal hidden attack paths in Active Directory/Azure environments."
8
INSTALL_COMMANDS = [
9
"pip install --user bloodhound",
10
"sudo apt-get install -y neo4j",
11
]
12
RUN_COMMANDS = ["bloodhound-python --help"]
13
PROJECT_URL = "https://github.com/BloodHoundAD/BloodHound"
14
SUPPORTED_OS = ["linux", "macos"]
15
16
17
class NetExec(HackingTool):
18
TITLE = "NetExec — nxc (Network Pentesting)"
19
DESCRIPTION = "Swiss army knife for pentesting Windows/AD networks. Successor to CrackMapExec."
20
INSTALL_COMMANDS = ["pip install --user netexec"]
21
RUN_COMMANDS = ["nxc --help"]
22
PROJECT_URL = "https://github.com/Pennyw0rth/NetExec"
23
SUPPORTED_OS = ["linux", "macos"]
24
25
26
class Impacket(HackingTool):
27
TITLE = "Impacket (Network Protocol Tools)"
28
DESCRIPTION = "Python classes for working with SMB, MSRPC, Kerberos, LDAP, and more."
29
INSTALL_COMMANDS = ["pip install --user impacket"]
30
RUN_COMMANDS = ["impacket-smbclient --help"]
31
PROJECT_URL = "https://github.com/fortra/impacket"
32
SUPPORTED_OS = ["linux", "macos"]
33
34
35
class Responder(HackingTool):
36
TITLE = "Responder (LLMNR/NBT-NS Poisoner)"
37
DESCRIPTION = "LLMNR/NBT-NS/MDNS poisoner with rogue authentication servers for credential capture."
38
INSTALL_COMMANDS = ["git clone https://github.com/lgandx/Responder.git"]
39
RUN_COMMANDS = ["cd Responder && sudo python3 Responder.py --help"]
40
PROJECT_URL = "https://github.com/lgandx/Responder"
41
SUPPORTED_OS = ["linux"]
42
43
44
class Certipy(HackingTool):
45
TITLE = "Certipy (AD Certificate Abuse)"
46
DESCRIPTION = "Active Directory Certificate Services enumeration and abuse tool."
47
INSTALL_COMMANDS = ["pip install --user certipy-ad"]
48
RUN_COMMANDS = ["certipy --help"]
49
PROJECT_URL = "https://github.com/ly4k/Certipy"
50
SUPPORTED_OS = ["linux", "macos"]
51
52
53
class Kerbrute(HackingTool):
54
TITLE = "Kerbrute (Kerberos Brute Force)"
55
DESCRIPTION = "Kerberos pre-auth brute-forcer for username enumeration and password spraying."
56
REQUIRES_GO = True
57
INSTALL_COMMANDS = [
58
"go install github.com/ropnop/kerbrute@latest",
59
]
60
RUN_COMMANDS = ["kerbrute --help"]
61
PROJECT_URL = "https://github.com/ropnop/kerbrute"
62
SUPPORTED_OS = ["linux", "macos"]
63
64
65
class ActiveDirectoryTools(HackingToolsCollection):
66
TITLE = "Active Directory Tools"
67
DESCRIPTION = "Tools for AD enumeration, attack path discovery, and credential attacks."
68
TOOLS = [
69
BloodHound(),
70
NetExec(),
71
Impacket(),
72
Responder(),
73
Certipy(),
74
Kerbrute(),
75
]
76