Free Active Directory pentesting CLI for AD enumeration, BloodHound, Kerberoasting, ADCS, and attack paths.
ADscan is a free Linux CLI for pentesters, red teamers, and security consultants who need one workflow for Active Directory enumeration, BloodHound collection, Kerberoasting, AS-REP roasting, ADCS checks, password spraying, DCSync, credential dumping, and evidence export.
It is built for real internal Active Directory assessments and labs, so you can go from unauthenticated recon to privilege escalation from one terminal instead of juggling isolated scripts, cheatsheets, and wrappers.
Auto-pwns HTB Forest in ~3 minutes
pipx install adscan
adscan install
adscan startFull installation guide & docs at adscanpro.com/docs
- Active Directory enumeration from one CLI: DNS, LDAP, SMB, Kerberos, trust, ADCS, and BloodHound-ready collection in one workflow.
- Attack execution without tool-hopping: Kerberoasting, AS-REP roasting, password spraying, GPP, DCSync, and credential workflows stay inside the same workspace.
- Built for real pentest cadence: use it in internal AD audits, red team operations, HTB/VulnLab labs, and repeatable attack-path validation.
- Evidence-first output: keep domain-scoped workspaces and export TXT/JSON artifacts for reports, retesting, or client handoff.
Use ADscan when you need to move quickly through internal Active Directory assessments:
- CTF and lab auto-pwn: reproduce HTB Forest, Active, and Cicada attack chains from the docs.
- Unauthenticated AD recon: discover domains, DNS, SMB exposure, null sessions, users, and roastable accounts.
- Authenticated enumeration: collect LDAP, SMB, Kerberos, ADCS, BloodHound CE data, and credential exposure.
- Privilege escalation: execute supported Kerberoasting, AS-REP Roasting, DCSync, GPP password, ADCS, and local credential workflows.
- Evidence handling: keep workspaces isolated and export findings to TXT/JSON for reports.
adscan start
start_unauthMore walkthroughs:
For local development in this repository:
uv sync --extra dev
uv run adscan --help
uv run adscan versionQuality checks:
uv run ruff check adscan_core adscan_launcher adscan_internal
uv run pytest -m unit
uv run python -m build|
Everything a pentester could do manually, 10x faster:
|
What nobody can do manually in reasonable time:
|
| OS | Linux (Debian/Ubuntu/Kali) |
| Docker | Docker Engine + Compose |
| Privileges | docker group or sudo |
| Network | Internet (pull images) + target network |
Source available under the Business Source License 1.1.
- Use freely for pentesting (personal or paid engagements)
- Read, modify, and redistribute the source code
- Cannot create a competing commercial product
- Converts to Apache 2.0 on 2029-02-01
Bug reports, lab reproductions, command-output samples, and focused pull requests are welcome. See CONTRIBUTING.md and open an issue with your OS, Docker version, ADscan version, command, and sanitized output.
Enterprise support: hello@adscanpro.com
(c) 2024-2026 Yeray Martin Dominguez | adscanpro.com