Skip to content

ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an interactive CLI with a wide range of commands to streamline internal audits and AD-focused pentests.

License

Notifications You must be signed in to change notification settings

ADScanPro/adscan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

51 Commits
ย 
ย 
ย 
ย 

Repository files navigation

ADscan


๐ŸŽฌ Demo

asciicast

Auto-pwns HTB Forest in ~3 minutes ๐Ÿš€


๐ŸŽฏ Overview

ADscan is an interactive CLI that automates and orchestrates Active Directory pentesting workflows. It helps teams ship internal AD engagements faster by reducing manual glue-work (tool handoffs, copy/paste, evidence collection, reporting).

Operation Modes

  • ๐Ÿค– Automatic (auto=True, labs/CTF): minimal prompts, fast flow
  • ๐Ÿค Semi-automatic (auto=False, internal/prod): prompts before risky actions
  • ๐ŸŽฎ Manual: full operator control

Why ADscan?

  • ๐Ÿš€ Auto-pwns retired HTB machines in minutes (Forest, Active, Cicada)
  • โšก Save time: less glue-work, more repeatable workflows
  • ๐ŸŽฎ Built for pentesters: CLI-first, designed for operators
  • ๐Ÿงพ Evidence packaging: workspace outputs + report templates

Try ADscan PRO โ€” Request a FREE 30-Day POV (first 5 teams) at adscanpro.com

๐Ÿ”ฅ 30-Day POV โ€” COMPLETELY FREE (First 5 Teams Only):

  • โšก LIMITED: Only 5 FREE POV slots available
  • Duration: 1 internal AD pentest project
  • Team: Up to 5 pentesters
  • Pricing: 100% FREE for first 5 teams (after that: โ‚ฌ497 + VAT standard)
  • Includes:
    • Modes: automatic / semi-automatic / manual
    • 1:1 onboarding (60-90 min) + priority support
    • MITRE-mapped report templates
  • ๐Ÿ“Š In exchange: Measured case study (baseline vs ADscan) + honest testimonial + detailed feedback
  • Zero risk: If it doesn't deliver results (โ‰ฅ1 credential OR โ‰ฅ1 day saved), simply walk awayโ€”no strings attached

โœจ Features

๐Ÿ”“ LITE (Free)

Core capabilities:

  • โœ… Three operation modes (automatic/semi-automatic/manual)
  • โœ… Unauthenticated & authenticated reconnaissance
  • โœ… Kerberos exploitation (AS-REP, Kerberoast)
  • โœ… BloodHound integration & analysis
  • โœ… Credential harvesting (SAM, LSA, DCSync)
  • โœ… Workspace & evidence management
  • โœ… Community Discord support

๐Ÿ”’ PRO (Coming Q4 2025)

Planned enhancements:

  • ๐ŸŽฏ Trust relationship autonomous enumeration
  • ๐ŸŽซ ADCS ESC auto-exploitation
  • ๐Ÿ“„ MITRE-mapped Word/PDF reports (auto-generated)
  • โ˜๏ธ Cloud-accelerated hash cracking
  • ๐Ÿ” CVE/misconfig autonomous scanning
  • ๐Ÿค– Advanced automated attack chains
  • ๐Ÿข Priority enterprise support

๐Ÿ“‹ Requirements

Requirement Details
OS Linux (Debian/Ubuntu/Kali and other Debian-based distros)
Docker Docker Engine + Compose (plugin or docker-compose)
Privileges User must be able to run Docker (docker group or sudo)
Python Not required for Docker mode (pipx wrapper only)
Network Internet to pull images, target network access

๐Ÿš€ Quick Install

# Install via pipx (recommended)
pipx install adscan

# Install (pulls the latest ADscan image + BloodHound CE images)
adscan install

# Start ADscan
adscan start

BloodHound CE Password

During adscan install, ADscan will try to ensure the BloodHound CE admin password is set to a known value for a smooth first-time experience:

adscan install --bh-admin-password 'Adscan4thewin!'

If the automatic password change fails (for example because BloodHound CE isnโ€™t ready yet), ADscan prints the exact manual steps to finish it in the web UI.

Legacy (Host) Installer

ADscan also includes a legacy host-based installer for environments where Docker is not available:

adscan install --legacy

๐Ÿ“š Complete installation guide, quick start, and full documentation โ†’ adscanpro.com/docs


๐Ÿค– CI/CD Mode

ADscan supports non-interactive mode for automated testing.

๐Ÿ“š Complete CI/CD documentation and examples โ†’ adscanpro.com/docs


๐Ÿ† Tested On

Provider Machine Status
Hack The Box Forest (Retired) โœ… Auto-pwned in ~3min
Hack The Box Active (Retired) โœ… Auto-pwned
Hack The Box Cicada (Retired) โœ… Auto-pwned

Contribute: If you auto-pwn labs with ADscan, open a PR to add them to the matrix!


๐Ÿ”’ Security & Privacy

  • Telemetry: Opt-in by default (toggle with set telemetry off)
  • No sensitive data: Only anonymized error data and feature usage
  • Local-first: All data stored in $ADSCAN_HOME/workspaces/ (default: ~/.adscan/workspaces/)

๐Ÿ“š Documentation

All documentation, guides, walkthroughs, and command references are available at:

Includes installation guides, quick start, complete command reference, CTF walkthroughs, lab guides, best practices, and more.


๐Ÿ’ฌ Community & Support

Discord GitHub Website

Need help?


๐ŸŽ“ Presented At

Announcement: ADscan was presented at Hackรฉn 2025 cybersecurity conference.


๐Ÿ“œ License

ยฉ 2025 Yeray Martรญn Domรญnguez โ€” Released under custom EULA ADscan LITE 3.2.2 | PRO edition: Q4 2025


โญ Star this repo if ADscan helped you! | ๐Ÿ”— Share with #adscan

Made with โค๏ธ for the pentesting community

About

ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an interactive CLI with a wide range of commands to streamline internal audits and AD-focused pentests.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published