{"id":29734,"date":"2023-08-25T06:40:43","date_gmt":"2023-08-25T06:40:43","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=29734"},"modified":"2023-08-25T06:40:46","modified_gmt":"2023-08-25T06:40:46","slug":"ad-pentesting-toolkit","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/","title":{"rendered":"AD_Enumeration_Hunt &#8211; AD Pentesting Toolkit"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be used for Active Directory (AD) penetration testing and security assessment.<\/p>\n\n\n\n<p>The scripts cover various aspects of AD enumeration, user and group management, computer enumeration, network and security analysis, and more.<\/p>\n\n\n\n<p>The toolkit is intended for use by penetration testers, red teamers, and security professionals who want to test and assess the security of Active Directory environments. <\/p>\n\n\n\n<p>Please ensure that you have proper authorization and permission before using these scripts in any production environment.<\/p>\n\n\n\n<p>Everyone is looking at what you are looking at; But can everyone see what he can see? You are the only difference between them\u2026 By Mevl\u00e2n\u00e2 Cel\u00e2ledd\u00een-i R\u00fbm\u00ee<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/alperenugurlu\/AD_Enumeration_Hunt#features\"><\/a><strong>Features<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmi_U1wWZbagD74X7mCSd3yjDUZ6XyA1wNTTbzeDbESXa-woNLa1t6BajuPORupaQ5vM3o1sTq_iz4apD92kBlLSH6iVU1plAp9H-V8zmHZaJX-3uHraYCJt7FKQYiGOW7syRUZAbw4aNjAwK4NV4QpsJB3h978AIu9zuXviZ2qShtkP7q3gOGlW_lBw\/s16000\/258566614-456c87fa-8480-4fae-8dfa-1b7288303ace.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enumerate and gather information about AD domains, users, groups, and computers.<\/li>\n\n\n\n<li>Check trust relationships between domains.<\/li>\n\n\n\n<li>List all objects inside a specific Organizational Unit (OU).<\/li>\n\n\n\n<li>Retrieve information about the currently logged-in user.<\/li>\n\n\n\n<li>Perform various operations related to local users and groups.<\/li>\n\n\n\n<li>Configure firewall rules and enable Remote Desktop (RDP).<\/li>\n\n\n\n<li>Connect to remote machines using RDP.<\/li>\n\n\n\n<li>Gather network and security information.<\/li>\n\n\n\n<li>Check Windows Defender status and exclusions configured via GPO.<\/li>\n\n\n\n<li>&#8230;and more!<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/alperenugurlu\/AD_Enumeration_Hunt#usage\"><\/a><strong>Usage<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Clone the repository or download the scripts as needed.<\/li>\n\n\n\n<li>Run the PowerShell script using the appropriate PowerShell environment.<\/li>\n\n\n\n<li>Follow the on-screen prompts to provide domain, username, and password when required.<\/li>\n\n\n\n<li>Enjoy exploring the AD Pentesting Toolkit and use the scripts responsibly!<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/alperenugurlu\/AD_Enumeration_Hunt#disclaimer\"><\/a><strong>Disclaimer<\/strong><\/h2>\n\n\n\n<p>The AD Pentesting Toolkit is for educational and testing purposes only. The authors and contributors are not responsible for any misuse or damage caused by the use of these scripts. <\/p>\n\n\n\n<p>Always ensure that you have proper authorization and permission before performing any penetration testing or security assessment activities on any system or network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/alperenugurlu\/AD_Enumeration_Hunt#license\"><\/a><strong>License<\/strong><\/h2>\n\n\n\n<p>This project is licensed under the&nbsp;<a href=\"https:\/\/github.com\/alperenugurlu\/AD_Enumeration_Hunt\/blob\/alperen_ugurlu_hack\/LICENSE\">MIT License<\/a>. The Mewtwo ASCII art is the property of Alperen Ugurlu. All rights reserved.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/alperenugurlu\/AD_Enumeration_Hunt#cyber-security-consultant-alperen-ugurlu\"><\/a><strong>Cyber Security Consultant<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.linkedin.com\/in\/alperen-ugurlu-7b57b7178\/\"><strong>Alperen Ugurlu<\/strong><\/a><\/h2>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/bfed26a89f55c2552f86df2a864615d9dc8e9ebd6419ef08e29d91451549eee0\/68747470733a2f2f6769746875622d726561646d652d73746174732e76657263656c2e6170702f6170693f757365726e616d653d616c706572656e756775726c752673686f775f69636f6e733d74727565\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be used for Active Directory (AD) penetration testing and security assessment. The scripts cover various aspects of AD enumeration, user and group management, computer enumeration, network and security analysis, and more. The toolkit is intended for [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":29738,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,5840],"tags":[78,737,2467,2577],"class_list":["post-29734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-penetration-testing-tools","tag-active-directory","tag-cybersecurity","tag-penetration-testing","tag-powershell"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AD_Enumeration_Hunt - AD Pentesting Toolkit<\/title>\n<meta name=\"description\" content=\"Welcome to the AD Pentesting Toolkit! Discover PowerShell scripts for Active Directory penetration testing and security assessment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AD_Enumeration_Hunt - AD Pentesting Toolkit\" \/>\n<meta property=\"og:description\" content=\"Welcome to the AD Pentesting Toolkit! Discover PowerShell scripts for Active Directory penetration testing and security assessment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-25T06:40:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-25T06:40:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"AD_Enumeration_Hunt &#8211; AD Pentesting Toolkit\",\"datePublished\":\"2023-08-25T06:40:43+00:00\",\"dateModified\":\"2023-08-25T06:40:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/\"},\"wordCount\":328,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp\",\"keywords\":[\"Active Directory\",\"cybersecurity\",\"Penetration Testing\",\"PowerShell\"],\"articleSection\":[\"Cyber security\",\"Pentesting Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/\",\"name\":\"AD_Enumeration_Hunt - AD Pentesting Toolkit\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp\",\"datePublished\":\"2023-08-25T06:40:43+00:00\",\"dateModified\":\"2023-08-25T06:40:46+00:00\",\"description\":\"Welcome to the AD Pentesting Toolkit! Discover PowerShell scripts for Active Directory penetration testing and security assessment.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AD_Enumeration_Hunt - AD Pentesting Toolkit","description":"Welcome to the AD Pentesting Toolkit! Discover PowerShell scripts for Active Directory penetration testing and security assessment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/","og_locale":"en_US","og_type":"article","og_title":"AD_Enumeration_Hunt - AD Pentesting Toolkit","og_description":"Welcome to the AD Pentesting Toolkit! Discover PowerShell scripts for Active Directory penetration testing and security assessment.","og_url":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-08-25T06:40:43+00:00","article_modified_time":"2023-08-25T06:40:46+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"AD_Enumeration_Hunt &#8211; AD Pentesting Toolkit","datePublished":"2023-08-25T06:40:43+00:00","dateModified":"2023-08-25T06:40:46+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/"},"wordCount":328,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp","keywords":["Active Directory","cybersecurity","Penetration Testing","PowerShell"],"articleSection":["Cyber security","Pentesting Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/","url":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/","name":"AD_Enumeration_Hunt - AD Pentesting Toolkit","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp","datePublished":"2023-08-25T06:40:43+00:00","dateModified":"2023-08-25T06:40:46+00:00","description":"Welcome to the AD Pentesting Toolkit! Discover PowerShell scripts for Active Directory penetration testing and security assessment.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36223,"url":"https:\/\/kalilinuxtutorials.com\/hackthebox-ad-machines\/","url_meta":{"origin":29734,"position":0},"title":"HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"HackTheBox (HTB) offers a range of Active Directory (AD) machines designed to help cybersecurity enthusiasts and professionals practice enumeration, exploitation, and attack techniques on AD environments. These machines vary in difficulty, providing challenges for both beginners and advanced users. Below is an overview of tools commonly used for tackling AD\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33703,"url":"https:\/\/kalilinuxtutorials.com\/penetration-testing-tools\/","url_meta":{"origin":29734,"position":1},"title":"Penetration Testing Tools &#8211; For Educational And Ethical Use","author":"Varshini","date":"July 8, 2024","format":false,"excerpt":"This repository contains a collection of tools and resources for penetration testing and security research. This repository is intended solely for educational purposes and ethical penetration testing. By accessing, using, or contributing to this repository, you agree to the following terms: Educational Use Only: The tools and information provided in\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYucVz0EnmN3muSglVvHo-qGDv-EM8BfHNKry1-AeaJ3iJkV3iMweiVAfZjwDW1GBDKv16X9gSSk24bz0lcSlmUJ9WlV5FKdElfywNrE2a0mnf0HnprWi-WIUNpO77DoxtaDi8CzNwSSpGdNjHscp1ofjBQCipQaoTbhKQ4uCIpzCSyLfwTnRmLHoWq9Jc\/s16000\/Penetration%20Testing%20Tools.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYucVz0EnmN3muSglVvHo-qGDv-EM8BfHNKry1-AeaJ3iJkV3iMweiVAfZjwDW1GBDKv16X9gSSk24bz0lcSlmUJ9WlV5FKdElfywNrE2a0mnf0HnprWi-WIUNpO77DoxtaDi8CzNwSSpGdNjHscp1ofjBQCipQaoTbhKQ4uCIpzCSyLfwTnRmLHoWq9Jc\/s16000\/Penetration%20Testing%20Tools.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYucVz0EnmN3muSglVvHo-qGDv-EM8BfHNKry1-AeaJ3iJkV3iMweiVAfZjwDW1GBDKv16X9gSSk24bz0lcSlmUJ9WlV5FKdElfywNrE2a0mnf0HnprWi-WIUNpO77DoxtaDi8CzNwSSpGdNjHscp1ofjBQCipQaoTbhKQ4uCIpzCSyLfwTnRmLHoWq9Jc\/s16000\/Penetration%20Testing%20Tools.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYucVz0EnmN3muSglVvHo-qGDv-EM8BfHNKry1-AeaJ3iJkV3iMweiVAfZjwDW1GBDKv16X9gSSk24bz0lcSlmUJ9WlV5FKdElfywNrE2a0mnf0HnprWi-WIUNpO77DoxtaDi8CzNwSSpGdNjHscp1ofjBQCipQaoTbhKQ4uCIpzCSyLfwTnRmLHoWq9Jc\/s16000\/Penetration%20Testing%20Tools.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYucVz0EnmN3muSglVvHo-qGDv-EM8BfHNKry1-AeaJ3iJkV3iMweiVAfZjwDW1GBDKv16X9gSSk24bz0lcSlmUJ9WlV5FKdElfywNrE2a0mnf0HnprWi-WIUNpO77DoxtaDi8CzNwSSpGdNjHscp1ofjBQCipQaoTbhKQ4uCIpzCSyLfwTnRmLHoWq9Jc\/s16000\/Penetration%20Testing%20Tools.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYucVz0EnmN3muSglVvHo-qGDv-EM8BfHNKry1-AeaJ3iJkV3iMweiVAfZjwDW1GBDKv16X9gSSk24bz0lcSlmUJ9WlV5FKdElfywNrE2a0mnf0HnprWi-WIUNpO77DoxtaDi8CzNwSSpGdNjHscp1ofjBQCipQaoTbhKQ4uCIpzCSyLfwTnRmLHoWq9Jc\/s16000\/Penetration%20Testing%20Tools.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32953,"url":"https:\/\/kalilinuxtutorials.com\/hacker-toolkit\/","url_meta":{"origin":29734,"position":2},"title":"HackerToolkit &#8211; Your Comprehensive Arsenal For Ethical Hacking And Penetration Testing","author":"Varshini","date":"May 6, 2024","format":false,"excerpt":"Step into the realm of ethical hacking with HackerToolkit, your ultimate resource for penetration testing, red teaming, and bug bounty hunting. Dive into a curated collection of tools designed to enhance your hacking capabilities, all conveniently organized and easily installable with a single script. Welcome To The HackerToolkit Your Comprehensive\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj86N82CFOd500s1Buu6PcoC1sjujIzqzrkRKklS5vW9ABVuFKJoieyiUNp34d5x5hpdvDMY-2ng0_BMYs_RBb1zhDudnJeYi1ZlGkEIr9j35AHV1FDfSDOeMfw9IaU05TvcucSThcLPT40wAhZEyLDuGsRNz9axStsfimoCQO1FOMO8o1T9seOEfml9fgq\/s16000\/Hacker%20Toolkit.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj86N82CFOd500s1Buu6PcoC1sjujIzqzrkRKklS5vW9ABVuFKJoieyiUNp34d5x5hpdvDMY-2ng0_BMYs_RBb1zhDudnJeYi1ZlGkEIr9j35AHV1FDfSDOeMfw9IaU05TvcucSThcLPT40wAhZEyLDuGsRNz9axStsfimoCQO1FOMO8o1T9seOEfml9fgq\/s16000\/Hacker%20Toolkit.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj86N82CFOd500s1Buu6PcoC1sjujIzqzrkRKklS5vW9ABVuFKJoieyiUNp34d5x5hpdvDMY-2ng0_BMYs_RBb1zhDudnJeYi1ZlGkEIr9j35AHV1FDfSDOeMfw9IaU05TvcucSThcLPT40wAhZEyLDuGsRNz9axStsfimoCQO1FOMO8o1T9seOEfml9fgq\/s16000\/Hacker%20Toolkit.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj86N82CFOd500s1Buu6PcoC1sjujIzqzrkRKklS5vW9ABVuFKJoieyiUNp34d5x5hpdvDMY-2ng0_BMYs_RBb1zhDudnJeYi1ZlGkEIr9j35AHV1FDfSDOeMfw9IaU05TvcucSThcLPT40wAhZEyLDuGsRNz9axStsfimoCQO1FOMO8o1T9seOEfml9fgq\/s16000\/Hacker%20Toolkit.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj86N82CFOd500s1Buu6PcoC1sjujIzqzrkRKklS5vW9ABVuFKJoieyiUNp34d5x5hpdvDMY-2ng0_BMYs_RBb1zhDudnJeYi1ZlGkEIr9j35AHV1FDfSDOeMfw9IaU05TvcucSThcLPT40wAhZEyLDuGsRNz9axStsfimoCQO1FOMO8o1T9seOEfml9fgq\/s16000\/Hacker%20Toolkit.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj86N82CFOd500s1Buu6PcoC1sjujIzqzrkRKklS5vW9ABVuFKJoieyiUNp34d5x5hpdvDMY-2ng0_BMYs_RBb1zhDudnJeYi1ZlGkEIr9j35AHV1FDfSDOeMfw9IaU05TvcucSThcLPT40wAhZEyLDuGsRNz9axStsfimoCQO1FOMO8o1T9seOEfml9fgq\/s16000\/Hacker%20Toolkit.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3248,"url":"https:\/\/kalilinuxtutorials.com\/babysploit-beginner-pentesting-toolkit\/","url_meta":{"origin":29734,"position":3},"title":"BabySploit &#8211; Beginner Pentesting Toolkit\/Framework Written in Python","author":"R K","date":"November 22, 2018","format":false,"excerpt":"BabySploit is a penetration testing toolkit aimed at making it easy to learn how to use bigger, more complicated frameworks like Metasploit. With a very easy to use UI and toolkit, anybody from any experience level will find use out of BabySploit. Below are some screenshots of the framework. BabySploit\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/11\/Running-A-Tool.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/11\/Running-A-Tool.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/11\/Running-A-Tool.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/11\/Running-A-Tool.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":35601,"url":"https:\/\/kalilinuxtutorials.com\/shadowhound\/","url_meta":{"origin":29734,"position":4},"title":"ShadowHound : Leveraging PowerShell For Stealthy Active Directory Enumeration","author":"Varshini","date":"January 3, 2025","format":false,"excerpt":"ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like SharpHound. It leverages native PowerShell capabilities to minimize detection risks and offers two methods for data collection: ShadowHound-ADM.ps1: Uses the Active Directory module (ADWS). ShadowHound-DS.ps1: Utilizes direct LDAP queries via DirectorySearcher.\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34318,"url":"https:\/\/kalilinuxtutorials.com\/pentesting-active-directory\/","url_meta":{"origin":29734,"position":5},"title":"Pentesting Active Directory &#8211; A Comprehensive Guide To Tools, Techniques, And Commands","author":"Varshini","date":"August 6, 2024","format":false,"excerpt":"This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and PowerView commands, how to use Bloodhound and popular exploits such as Zerologon and NO-PAC. Enumeration Initial System Enumeration See local accounts net user See all of the accounts in the\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjU6PtAFlJ4dIMpLF3DWjaHUjZtqMTP6jvqifY4GWd9d0G1wxEQbfscybm5ggNoi2CJ0pZT19lqYbQxuxgNhXwE-hL0IkKxxM2X4ggUT1TQAD8I8PsPlXE9Iemz686nmhfBW_2Olr8WWVQpZg2LnOE1rnX5K9bHr9nc8T-pEEPisPm0nRIA_OsCGzh7cNBQ\/s16000\/Pentesting%20Active%20Directory%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjU6PtAFlJ4dIMpLF3DWjaHUjZtqMTP6jvqifY4GWd9d0G1wxEQbfscybm5ggNoi2CJ0pZT19lqYbQxuxgNhXwE-hL0IkKxxM2X4ggUT1TQAD8I8PsPlXE9Iemz686nmhfBW_2Olr8WWVQpZg2LnOE1rnX5K9bHr9nc8T-pEEPisPm0nRIA_OsCGzh7cNBQ\/s16000\/Pentesting%20Active%20Directory%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjU6PtAFlJ4dIMpLF3DWjaHUjZtqMTP6jvqifY4GWd9d0G1wxEQbfscybm5ggNoi2CJ0pZT19lqYbQxuxgNhXwE-hL0IkKxxM2X4ggUT1TQAD8I8PsPlXE9Iemz686nmhfBW_2Olr8WWVQpZg2LnOE1rnX5K9bHr9nc8T-pEEPisPm0nRIA_OsCGzh7cNBQ\/s16000\/Pentesting%20Active%20Directory%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjU6PtAFlJ4dIMpLF3DWjaHUjZtqMTP6jvqifY4GWd9d0G1wxEQbfscybm5ggNoi2CJ0pZT19lqYbQxuxgNhXwE-hL0IkKxxM2X4ggUT1TQAD8I8PsPlXE9Iemz686nmhfBW_2Olr8WWVQpZg2LnOE1rnX5K9bHr9nc8T-pEEPisPm0nRIA_OsCGzh7cNBQ\/s16000\/Pentesting%20Active%20Directory%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjU6PtAFlJ4dIMpLF3DWjaHUjZtqMTP6jvqifY4GWd9d0G1wxEQbfscybm5ggNoi2CJ0pZT19lqYbQxuxgNhXwE-hL0IkKxxM2X4ggUT1TQAD8I8PsPlXE9Iemz686nmhfBW_2Olr8WWVQpZg2LnOE1rnX5K9bHr9nc8T-pEEPisPm0nRIA_OsCGzh7cNBQ\/s16000\/Pentesting%20Active%20Directory%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjU6PtAFlJ4dIMpLF3DWjaHUjZtqMTP6jvqifY4GWd9d0G1wxEQbfscybm5ggNoi2CJ0pZT19lqYbQxuxgNhXwE-hL0IkKxxM2X4ggUT1TQAD8I8PsPlXE9Iemz686nmhfBW_2Olr8WWVQpZg2LnOE1rnX5K9bHr9nc8T-pEEPisPm0nRIA_OsCGzh7cNBQ\/s16000\/Pentesting%20Active%20Directory%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=29734"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29734\/revisions"}],"predecessor-version":[{"id":29741,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29734\/revisions\/29741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/29738"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=29734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=29734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=29734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}