Automated Active Directory Security Scanner
Features โข Installation โข Quick Start โข Documentation โข Discord
ADscan is a professional pentesting tool that automates Active Directory reconnaissance, enumeration, and exploitation. It reduces AD assessment time from hours to minutes with an intelligent interactive TUI.
- ๐ Auto-pwns retired HTB machines (Forest, Active, Cicada)
- โก Shrinks AD recon from hours to minutes
- ๐ฎ Perfect for CTFs, labs, and jump-boxes (100% CLI)
- ๐ Semi/automatic modes for labs and production environments
- ๐ BloodHound integration with automated path analysis
Try ADscan PRO โ Request a 14-day free POV at adscanpro.com ๐ฅ
|
|
| Requirement | Details |
|---|---|
| OS | Linux (Debian/Ubuntu/Kali and other Debian-based distros) |
| Privileges | Root access required |
| Python | 3.8+ (managed automatically with binary) |
| Network | Internet for installation, target network access |
pipx install adscanpip install adscan# Download latest release
wget https://github.com/ADscanPro/adscan/releases/latest/download/adscan
chmod +x adscan
sudo mv adscan /usr/local/bin/# Setup Python environment, tools, and wordlists
adscan install
# Verify installation
adscan checkโก Ready to hack! โ Run adscan start and share your results with #adscan on X/Twitter.
adscan start -v(ADscan) > workspace create my_audit(ADscan:my_audit) > set iface tun0
(ADscan:my_audit) > set auto False # Semi-automatic (recommended)Unauthenticated:
(ADscan:my_audit) > set hosts 192.168.1.0/24
(ADscan:my_audit) > start_unauthAuthenticated:
(ADscan:my_audit) > start_auth domain.local 10.10.10.1 username passwordADscan guides you through enumeration and exploitation automatically! ๐ฏ
Auto-pwns HTB Forest in ~3 minutes ๐
Run ADscan non-interactively for automated testing:
# Unauthenticated scan
adscan ci unauth --type ctf --interface tun0 --hosts 10.10.10.10
# Authenticated scan
adscan ci auth --type ctf --interface tun0 \
--domain example.local --dc-ip 10.10.10.1 \
--username user --password pass
# Keep workspace for debugging
adscan ci unauth --type ctf --interface tun0 --hosts 10.10.10.10 --keep-workspaceExit Codes:
0: Success with flags validated1: Scan failed2: Scan successful but flags invalid/missing
Comprehensive documentation available at adscanpro.com/docs
- ๐ Getting Started
- ๐ง Command Reference
- ๐ CTF Walkthrough
| Provider | Machine | Status |
|---|---|---|
| Hack The Box | Forest (Retired) | โ Auto-pwned in ~3min |
| Hack The Box | Active (Retired) | โ Auto-pwned |
| Hack The Box | Cicada (Retired) | โ Auto-pwned |
Contribute: If you auto-pwn labs with ADscan, open a PR to add them to the matrix!
- Telemetry: Opt-in by default (toggle with
set telemetry off) - No sensitive data: Only anonymized error data and feature usage
- Local-first: All data stored in
~/.adscan/workspaces/ - Open source LITE: Transparent security tool
| Quarter | Milestone |
|---|---|
| Q3 2025 | More ACL exploitation, pre-2k module, Kerberos unconstrained pathing |
| Q4 2025 | PRO release โ Trust enum, ADCS ESC, auto reports |
| Q1 2026 | NTLM relay chain, SCCM module |
| Q2 2026 | PwnDoc integration, cloud-accelerated cracking |
Timelines are targets, not promises. Features may adjust based on feedback.
Need help?
- ๐ฌ Chat on Discord
- ๐ Report bugs via GitHub Issues
- ๐ง Enterprise support: hello@adscanpro.com
Announcement: ADscan was presented at Hackรฉn 2025 cybersecurity conference.
ยฉ 2025 Yeray Martรญn Domรญnguez โ Released under custom EULA ADscan LITE 2.3.1 | PRO edition: Q4 2025
โญ Star this repo if ADscan helped you! | ๐ Share with #adscan
Made with โค๏ธ for the pentesting community