active-directory-attacks
Audited by Socket on Feb 27, 2026
2 alerts found:
SecurityMalwareThe fragment serves as a thorough offensive AD playbook appropriate for explicitly authorized red-team engagements. Its detailed procedures and commands enable rapid credential extraction and ticket-based persistence, which necessitates strict access control, auditing, and contractual boundaries. When distributed or stored, it should be protected and access-restricted to maintain safe usage. Overall risk remains high if exposed to public or untrusted actors.
This document is an offensive reference detailing actionable AD attack techniques (delegation, GPO abuse, SCCM/WSUS deployment of payloads, ADCS abuses, ticket forging, credential harvesting, etc.). It is highly actionable and intended to enable enterprise compromise and persistence. The content should be treated as malicious or dual-use offensive material: if found in a repository or dependency, it represents a high supply-chain and security risk and warrants immediate removal or strict review/containment. Use of the commands and tools described will likely result in credential theft, privilege escalation, and remote code execution in AD environments.