EnumPath is a fast, modular Windows domain enumeration framework designed for red team operations and authorized penetration testing. It automatically discovers domain information, enumerates users, shares, services, privileges, Kerberos attacks, ADCS vulnerabilities, delegation abuse paths, and more — using the best available tools on your system (CrackMapExec, NetExec, Impacket, Certipy, rpcclient, etc.).
The tool works with or without credentials and adapts to what tools are installed.
- Automatic tool detection and fallback methods
- SMB, LDAP, Kerberos, WinRM, RDP, and service enumeration
- Deep share crawling with high-value file detection (passwords, configs, certs, GPP, etc.)
- Kerberoasting, AS-REP roasting, delegation abuse (unconstrained, constrained, RBCD)
- ADCS certificate template enumeration (ESC1–ESC8 detection)
- Authentication coercion vector testing
- LAPS password read checks
- Privilege escalation path discovery (machine quota, GPO abuse, DCSync rights, etc.)
- BloodHound collection (optional)
- Comprehensive JSON reporting + executive summary + remediation report
- Ready-to-use attack command generation
- Python 3.8+
- Common tools installed (recommended):
crackmapexecornetexecimpacketsuitecertipybloodhound-python(for BloodHound collection)smbmap,smbclient,rpcclient,ldapsearch,nmap
- Run from a Linux/Kali environment for best results
No pip package needed — just clone and run:
git clone https://github.com/1x0DF0/EnumPath.git
cd EnumPath
# (Optional) Create a virtual environment
python3 -m venv venv && source venv/bin/activateInstall the most common dependencies (optional, tool will warn if missing):
pip install impacket certipy-ad colorama
# Then install your preferred CME fork:
# pip install crackmapexec or netexec# Anonymous enumeration
python3 enumpath.py -t 10.10.10.100
# With credentials
python3 enumpath.py -t 10.10.10.100 -u john -p Password123
# Deep enumeration (slower, more thorough)
python3 enumpath.py -t 10.10.10.100 -u john -p Password123 --deep
# Run only specific modules
python3 enumpath.py -t 10.10.10.100 -u john -p Password123 --modules adcs,kerberos,delegation
# Aggressive mode with auto-exploitation attempts
python3 enumpath.py -t 10.10.10.100 -u john -p Password123 --attack-mode aggressive --auto-exploitAll results are saved to a timestamped folder like enumpath_10.10.10.100_20251127_143022/ containing:
report.json– Full structured resultsexecutive_summary.json– High-level findingsremediation_report.json– Recommended fixesattack_paths.txt– Clear attack vectors foundcommands/– Ready-to-run exploit commandsloot/– Hashes, credentials, downloaded files, BloodHound ZIPs, etc.
This tool is for authorized security testing and educational purposes only.
Scanning or attacking systems without explicit permission is illegal.
The author is not responsible for misuse or damage.
MIT License (see LICENSE file when available)
Happy hunting (and stay legal)!