{"id":35601,"date":"2025-01-03T06:18:59","date_gmt":"2025-01-03T06:18:59","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=35601"},"modified":"2025-01-03T06:19:02","modified_gmt":"2025-01-03T06:19:02","slug":"shadowhound","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/shadowhound\/","title":{"rendered":"ShadowHound : Leveraging PowerShell For Stealthy Active Directory Enumeration"},"content":{"rendered":"\n<p>ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like SharpHound. <\/p>\n\n\n\n<p>It leverages native PowerShell capabilities to minimize detection risks and offers two methods for data collection:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ShadowHound-ADM.ps1<\/strong>: Uses the Active Directory module (ADWS).<\/li>\n\n\n\n<li><strong>ShadowHound-DS.ps1<\/strong>: Utilizes direct LDAP queries via <code>DirectorySearcher<\/code>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Blog Post<a href=\"https:\/\/github.com\/Friends-Security\/ShadowHound?tab=readme-ov-file#blog-post\"><\/a><\/strong><\/h2>\n\n\n\n<p>For more details and context, check out the <a href=\"https:\/\/blog.fndsec.net\/2024\/11\/25\/shadowhound\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">blog post<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Scripts Overview<a href=\"https:\/\/github.com\/Friends-Security\/ShadowHound?tab=readme-ov-file#scripts-overview\"><\/a><\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ShadowHound-ADM.ps1<a href=\"https:\/\/github.com\/Friends-Security\/ShadowHound?tab=readme-ov-file#shadowhound-admps1\"><\/a><\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Method<\/strong>: Active Directory module (<code>Get-ADObject<\/code> via ADWS).<\/li>\n\n\n\n<li><strong>Usage Scenario<\/strong>: When the AD module is available and ADWS is accessible.<\/li>\n\n\n\n<li><strong>Features<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Handles large domains with <code>-SplitSearch<\/code>, <code>-Recurse<\/code>, and <code>-LetterSplitSearch<\/code> options.<\/li>\n\n\n\n<li>Enumerates certificates with the <code>-Certificates<\/code> flag.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ShadowHound-DS.ps1<a href=\"https:\/\/github.com\/Friends-Security\/ShadowHound?tab=readme-ov-file#shadowhound-dsps1\"><\/a><\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Method<\/strong>: Direct LDAP queries using <code>DirectorySearcher<\/code>.<\/li>\n\n\n\n<li><strong>Usage Scenario<\/strong>: Environments where the AD module isn&#8217;t available or LDAP is preferred.<\/li>\n\n\n\n<li><strong>Features<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Enumerates certificates with the <code>-Certificates<\/code> flag.<\/li>\n\n\n\n<li>Supports alternate credentials with the <code>-Credential<\/code> parameter.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage Examples<a href=\"https:\/\/github.com\/Friends-Security\/ShadowHound?tab=readme-ov-file#usage-examples\"><\/a><\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Basic Enumeration<a href=\"https:\/\/github.com\/Friends-Security\/ShadowHound?tab=readme-ov-file#basic-enumeration\"><\/a><\/strong><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ShadowHound-ADM.ps1<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code># Basic usage\nShadowHound-ADM -OutputFilePath \"C:\\Results\\ldap_output.txt\"\n\n# Specify a domain controller and custom LDAP filter\nShadowHound-ADM -Server \"dc.domain.local\" -OutputFilePath \"C:\\Results\\ldap_output.txt\" -LdapFilter \"(objectClass=user)\"\n\n# Use alternate credentials\n$cred = Get-Credential\nShadowHound-ADM -OutputFilePath \"C:\\Results\\ldap_output.txt\" -Credential $cred -SearchBase \"DC=domain,DC=local\"<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ShadowHound-DS.ps1<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code># Basic usage\nShadowHound-DS -OutputFile \"C:\\Results\\ldap_output.txt\"\n\n# Specify a domain controller\nShadowHound-DS -Server \"dc.domain.local\" -OutputFile \"C:\\Results\\ldap_output.txt\"\n\n# Use a custom LDAP filter\nShadowHound-DS -OutputFile \"C:\\Results\\ldap_output.txt\" -LdapFilter \"(objectClass=computer)\"<\/code><\/pre>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/Friends-Security\/ShadowHound?tab=readme-ov-file#usage-examples\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like SharpHound. It leverages native PowerShell capabilities to minimize detection risks and offers two methods for data collection: Blog Post For more details and context, check out the blog post. Scripts Overview ShadowHound-ADM.ps1 ShadowHound-DS.ps1 Usage Examples Basic [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":35605,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25],"tags":[737,6321,6052,6325,7009],"class_list":["post-35601","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-shadowhound"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ShadowHound : Leveraging PowerShell For Stealthy Active<\/title>\n<meta name=\"description\" content=\"ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/shadowhound\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ShadowHound : Leveraging PowerShell For Stealthy Active\" \/>\n<meta property=\"og:description\" content=\"ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/shadowhound\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-03T06:18:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T06:19:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/shadowhound\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shadowhound\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"ShadowHound : Leveraging PowerShell For Stealthy Active Directory Enumeration\",\"datePublished\":\"2025-01-03T06:18:59+00:00\",\"dateModified\":\"2025-01-03T06:19:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shadowhound\/\"},\"wordCount\":151,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shadowhound\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"ShadowHound\"],\"articleSection\":[\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/shadowhound\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/shadowhound\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/shadowhound\/\",\"name\":\"ShadowHound : Leveraging PowerShell For Stealthy Active\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shadowhound\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shadowhound\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp\",\"datePublished\":\"2025-01-03T06:18:59+00:00\",\"dateModified\":\"2025-01-03T06:19:02+00:00\",\"description\":\"ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/shadowhound\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/shadowhound\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ShadowHound : Leveraging PowerShell For Stealthy Active","description":"ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/shadowhound\/","og_locale":"en_US","og_type":"article","og_title":"ShadowHound : Leveraging PowerShell For Stealthy Active","og_description":"ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like","og_url":"https:\/\/kalilinuxtutorials.com\/shadowhound\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-01-03T06:18:59+00:00","article_modified_time":"2025-01-03T06:19:02+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/shadowhound\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/shadowhound\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"ShadowHound : Leveraging PowerShell For Stealthy Active Directory Enumeration","datePublished":"2025-01-03T06:18:59+00:00","dateModified":"2025-01-03T06:19:02+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/shadowhound\/"},"wordCount":151,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/shadowhound\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","ShadowHound"],"articleSection":["Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/shadowhound\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/shadowhound\/","url":"https:\/\/kalilinuxtutorials.com\/shadowhound\/","name":"ShadowHound : Leveraging PowerShell For Stealthy Active","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/shadowhound\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/shadowhound\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp","datePublished":"2025-01-03T06:18:59+00:00","dateModified":"2025-01-03T06:19:02+00:00","description":"ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for introducing known-malicious binaries like","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/shadowhound\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/shadowhound\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYyfn3eRFQSjxub-RT7d97aAtaxGlSAjHs0ndmiRYSaK7WnJU8TvM4Uu0JWkRjNu688zgljHvrQBpjz0XDBo4uxpLv2E9pwbz78bnLWSwH7ORswgds3NZghRORHlRVm-sO_XXWEhXs4dFxn3FljkeM-VBWrlXaFC9MBoE-VWtTdG7mrO0LNRufAtbo2a7N\/s1600\/ShadowHound%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":31942,"url":"https:\/\/kalilinuxtutorials.com\/active-directory-exploitation-cheat-sheet\/","url_meta":{"origin":35601,"position":0},"title":"Active Directory Exploitation Cheat Sheet &#8211; A Comprehensive Guide To Enumeration And Attack Methods","author":"Varshini","date":"February 5, 2024","format":false,"excerpt":"This cheat sheet contains common enumeration and attack methods for Windows Active Directory. This cheat sheet is inspired by the\u00a0PayloadAllTheThings\u00a0repo. Summary Active Directory Exploitation Cheat Sheet Summary Tools Domain Enumeration Using PowerView Using AD Module Using BloodHound Remote BloodHound On Site BloodHound Using Adalanche Remote adalanche Useful Enumeration Tools Local\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":29734,"url":"https:\/\/kalilinuxtutorials.com\/ad-pentesting-toolkit\/","url_meta":{"origin":35601,"position":1},"title":"AD_Enumeration_Hunt &#8211; AD Pentesting Toolkit","author":"Varshini","date":"August 25, 2023","format":false,"excerpt":"Description Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be used for Active Directory (AD) penetration testing and security assessment. The scripts cover various aspects of AD enumeration, user and group management, computer enumeration, network and security analysis, and more.\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgRQNidCywBSvhZPPdBt_ukDVUl6ER4aTO2HlmYnohroCDuJot1JBs4oO_QOpWcj6Vmg2Lmv8-hrqmFV1Ir4-Pie_WnqJVbbntgApvMWd99B7GIRPbIF8KP5lqV06xy7wZ1s81Eye3VhoAoTy2B7DFxD3OOT0X5g-o-NT_Q-NueAQvmqhW9fLF4zGjI_w\/s16000\/AD_Enumeration_Hunt.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32058,"url":"https:\/\/kalilinuxtutorials.com\/linwinpwn-2\/","url_meta":{"origin":35601,"position":2},"title":"linWinPwn &#8211; Active Directory Vulnerability Scanner","author":"Varshini","date":"February 15, 2024","format":false,"excerpt":"A versatile bash script designed for automating Active Directory enumeration and vulnerability assessment. By leveraging a curated selection of tools and employing clever techniques like dynamic port forwarding, linWinPwn streamlines the process of gathering evidence in AD environments. Whether you're working against time constraints or aiming to minimize footprint, this\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEir68Esfbhp-tbg8DKcENoYMMWL1-QfkPn2T38qDrNrg7VjQDeHUr1Rfm2YNFa-PV6lMuNkOhyHERZPYc-bE18NIQN7Crm2vBugDaI8EcKk0xKTTzrRwP-nmb__nrEsH08MwtJ8bBw4F2Ifqwn9QapXykbg8xDXYTeU0XeMTxHXNFx04LV70yduDJ7uoTUT\/s16000\/Untitled%20design%20%2821%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36223,"url":"https:\/\/kalilinuxtutorials.com\/hackthebox-ad-machines\/","url_meta":{"origin":35601,"position":3},"title":"HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"HackTheBox (HTB) offers a range of Active Directory (AD) machines designed to help cybersecurity enthusiasts and professionals practice enumeration, exploitation, and attack techniques on AD environments. These machines vary in difficulty, providing challenges for both beginners and advanced users. Below is an overview of tools commonly used for tackling AD\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33798,"url":"https:\/\/kalilinuxtutorials.com\/adspider\/","url_meta":{"origin":35601,"position":4},"title":"ADSpider : Advanced Real-Time Monitoring Of Active Directory Changes","author":"Varshini","date":"July 12, 2024","format":false,"excerpt":"Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update Sequence Number (USN) to filter current properties of objects. Parameters DC\u00a0- domain controller FQDN.Formatlist\u00a0- output in list instead of table.ExcludelastLogonTimestamp\u00a0- exclude lastLogonTimestamp events from outputDumpAllObjects\u00a0- dump all active\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":5665,"url":"https:\/\/kalilinuxtutorials.com\/youzer-fake-user-active-directory\/","url_meta":{"origin":35601,"position":5},"title":"Youzer : Fake User Generator For Active Directory Environments","author":"R K","date":"July 9, 2019","format":false,"excerpt":"Fake User Generator for Active Directory Environments. The goal of Youzer is to create information rich Active Directory environments. This uses the python3 library 'faker' to generate random accounts. pip3 install faker You can either supply a wordlist or have the passwords generated. The generated option is great for testing\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/DIdFxF814AA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=35601"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35601\/revisions"}],"predecessor-version":[{"id":35604,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35601\/revisions\/35604"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/35605"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=35601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=35601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=35601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}