Ayi NEDJIMI - Cybersecurity & AI Tools

100+ open-source cybersecurity, AI, and GPU computing tools

View on GitHub

Active Directory Security Audit Tools

10 defensive audit tools for Active Directory environments, inspired by PingCastle and Purple Knight

Back to Home


Overview

Active Directory is the most targeted component of enterprise networks. These tools provide free, open-source alternatives to commercial AD auditing products, covering the full attack surface: Kerberos, LDAP, ACLs, delegation, and credential hygiene.


Tool Focus Area Key Threat
LDAPRecon-AI LDAP enumeration and security audit Information disclosure
ACLAudit-AI ACL misconfiguration detection Privilege escalation
KerberosAudit-AI Kerberos security assessment Kerberoasting, AS-REP
GoldenTicket-Detector Forged TGT detection Persistence
LateralMovement-Detector Lateral movement detection Pass-the-Hash, PtT
RemoteExec-Auditor Remote execution audit WMI, PSExec abuse
PrivEscAudit-AD Privilege escalation audit Shadow credentials, ESC1-8
DelegationAudit-AD Kerberos delegation audit Unconstrained delegation
DCSyncAudit-AD DCSync rights monitoring Credential dumping
CredentialAudit-AD Credential hygiene audit Weak/default passwords

Quick Start

All AD audit tools follow the same installation pattern:

git clone https://github.com/ayinedjimi/TOOL-NAME.git
cd TOOL-NAME
pip install -r requirements.txt
python -m tool_name --domain corp.local --dc 10.0.0.1

Use Cases

Pre-pentest assessment - Run before an engagement to identify quick wins and map the attack surface without active exploitation.

Continuous AD monitoring - Schedule regular scans to detect configuration drift and new misconfigurations introduced by IT changes.

Compliance verification - Verify AD settings against CIS Benchmarks for Active Directory, ANSSI guide de l’hygiene informatique, and Microsoft Security Baseline.

Incident response - Quickly identify compromised accounts, backdoors (Golden/Silver tickets), and active lateral movement paths.

Purple team exercises - Validate detection coverage of your SIEM/EDR against known AD attack techniques.


Covered Attack Techniques (MITRE ATT&CK)


Back to Home 2026 Ayi NEDJIMI