performing-kerberoasting-attack

Warn

Audited by Socket on Apr 7, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
scripts/process.py

This is an offensive security/assessment script for Kerberoasting: it enumerates SPN-enabled accounts, helps request TGS tickets (or prints appropriate Impacket/Rubeus commands), analyzes kerberoast hashes, and writes a report. The code itself does not contain covert exfiltration, obfuscated payloads, or direct backdoor functionality. However, it handles and emits credentials in cleartext (building command strings containing the password) and performs sensitive network operations against a domain controller — behaviors that can be abused if run by an unauthorized user. Recommendation: treat as dual-use offensive tooling. Do not run with production credentials on hostile or untrusted machines; avoid printing credentials, and secure output and logs. Overall: not obfuscated, not covertly malicious, but capable of facilitating offensive attacks and therefore poses a moderate security risk if misused.

Confidence: 92%Severity: 60%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent with its stated red-team purpose, but that purpose is to equip an AI agent with offensive credential-theft tradecraft. There is little evidence of hidden exfiltration or deceptive installs in the text itself, yet the capability set is inherently high risk because it enables post-exploitation and password cracking against AD environments.

Confidence: 92%Severity: 86%
Audit Metadata
Analyzed At
Apr 7, 2026, 02:58 AM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-kerberoasting-attack%2F@a82357022644ff3f345e99470edee50faecd3f60