p3ta-tricks
Ctrl+K
🐚 GTFOBins πŸͺŸ LOLBAS 🩸 BloodHound 🩸 bloodyAD πŸ“œ Certipy ☁️ Cloud ⚑ goexec πŸ€– HackTricks πŸ”Œ HardwareATT πŸ“¦ Impacket 🏰 InternalATT πŸ”€ Ligolo-ng 🐱 Mimikatz πŸ’£ msfvenom πŸ”§ NetExec πŸ€– OSAI πŸ’₯ PATT 🍳 Recipes 🎟️ Rubeus 🐍 Sliver
Home
Distro
Tools
🩸

bloodyAD

7 pages
SD Resolving feature
SD Resolving feature Using --resolve-sd, you can resolve the security descriptor to obtain a humanly understandable perm…
NTLM
NTLM Default when -p argument is specified. Works with LDAP/LDAPS, e.g. -p 'Password123!' or -p :2B576ACBE6BCFDA7294D6BD…
Cves Exploit
List of CVEs you can exploit with bloodyAD…
Enumeration with BloodyAD
Enumeration with BloodyAD Get AD forest level python bloodyAD.py -u <username> -p <password> -d <domain&g…
Home
Welcome to the bloodyAD wiki! To start, check the Installation page and User Guide . You can also see some Enumeration t…
Dependencies
Dependencies Python 3 MSLDAP dnspython Installation Steps A python package is available: pip install bloodyAD bloodyAD -…
Global Arguments
Global Arguments $ bloodyAD -h usage : bloodyAD [ -h ] [ -d DOMAIN ] [ -u USERNAME ] [ -p PASSWORD ] [ -k [KERBEROS ...]…

Set Variables

Values apply to all code blocks on this page and persist across pages in this session.

Search & Navigation Guide

Search
Ctrl+KOpen search from anywhere on the page
↑ ↓Move through results
EnterOpen the highlighted result
EscClose search

Searches all sources at once. The source name appears as a coloured tag on each result.

Filtering Search by Source

The coloured badges across the top bar (BloodHound, HackTricks, GTFOBins, etc.) are toggle buttons that narrow search to a single source.

β‘  Click a badgeβ€” restricts all results to that source only
β‘‘ Click it againβ€” deselects it, search returns to all sources

Only one source filter is active at a time. The active badge glows in its source colour. The search box placeholder updates to reflect which source is active.

BloodHound Edge Search

On the BloodHound page the edge search uses prefix matching β€” type Owns to find the Owns edge only, not AZOwns. Type AZ to see all Azure edges.
Switch to Collectors to pick SharpHound / BloodHound-Python / RustHound and see that collector's syntax inline.

Variables

Click Variables in the sidebar to fill placeholders like <domain>, <dc-ip>, <password> across every code block on the page. Values carry over between pages for the whole session. Edit All lets you update every saved value at once. Clear resets them all.

Distro Toggle

Controls the command style used in impacket code blocks.
Kali β€” impacket-secretsdump
Exegol β€” secretsdump.py
Script β€” python3 secretsdump.py

Tools Toggle (Impacket / GoPacket)

Switches between the Python impacket toolkit and its Go equivalent.
Impacket β€” standard Python tools, sidebar shows the Impacket reference
GoPacket β€” replaces every impacket- / secretsdump.py / python3 … with gopacket-secretsdump style, sidebar switches to the GoPacket reference. Distro selection is ignored when GoPacket is active.