Skip to content

Croumi/BadBlood

 
 

Repository files navigation

BadBlood

BadBlood fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different.

Installation

Requirements:

  • Domain Admin and Schema Admin permissions
  • Active Directory Powershell Installed

Running On Windows:

Set-ExecutionPolicy bypass
.\Invoke-BadBlood.ps1 -SkipLapsInstall

cat $wordlists/rockyou.txt| grep -P '.[A-Z].' | grep -P '.[a-z].' | grep -P '.\d.' | grep -P '&|=|$|%|!|:|.|\|(|)|[|]|{|}|,|_|-|/|"|#|\€|;|\£|?|<|>|\§|~|\µ' | grep -P '.{7,20}' | shuf -n 800000 > AD_Attack_Vectors/small_rockyou.txt && wc -l AD_Attack_Vectors/small_rockyou.txt

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • PowerShell 100.0%