p3ta-tricks
Ctrl+K
🐚 GTFOBins 🪟 LOLBAS 🩸 BloodHound 🩸 bloodyAD 📜 Certipy ☁️ Cloud ⚡ goexec 🤖 HackTricks 🔌 HardwareATT 📦 Impacket 🏰 InternalATT 🔀 Ligolo-ng 🐱 Mimikatz 💣 msfvenom 🔧 NetExec 🤖 OSAI 💥 PATT 🍳 Recipes 🎟️ Rubeus 🐍 Sliver
Home
Distro
Tools
📜

Certipy

9 pages
01 ‐ Introduction
Active Directory Certificate Services (AD CS) is Microsoft's on-premises Public Key Infrastructure (PKI) solution for is…
02 ‐ Terminology
This wiki assumes you're familiar with fundamental Active Directory (AD) concepts. Before exploring attack techniques, i…
03 ‐ Resources
This page presents a curated selection of key resources related to AD CS security. The resources are organized into thre…
04 ‐ Installation
Certipy is a Python tool that supports Python 3.12+ and runs on both Linux and Windows. The tool is distributed via pip …
05 ‐ Usage
Certipy is a command-line tool with a modular structure. The basic invocation is: certipy [ global options ] <command…
06 ‐ Privilege Escalation
Misconfigurations in AD CS can allow a low-privileged user to escalate privileges in Active Directory, often up to Domai…
07 ‐ Post‐Exploitation
Once an attacker has escalated privileges, successfully executed initial attacks, or otherwise acquired sufficient contr…
08 ‐ Command Reference
This section serves as a quick reference for Certipy's commands, summarizing their purpose and usage. Use this as a chea…
Home
👋 Welcome to the Certipy Wiki This wiki is your guide to abusing Active Directory Certificate Services (AD CS) with Cert…

Set Variables

Values apply to all code blocks on this page and persist across pages in this session.

Search & Navigation Guide

Search
Ctrl+KOpen search from anywhere on the page
↑ ↓Move through results
EnterOpen the highlighted result
EscClose search

Searches all sources at once. The source name appears as a coloured tag on each result.

Filtering Search by Source

The coloured badges across the top bar (BloodHound, HackTricks, GTFOBins, etc.) are toggle buttons that narrow search to a single source.

① Click a badge— restricts all results to that source only
② Click it again— deselects it, search returns to all sources

Only one source filter is active at a time. The active badge glows in its source colour. The search box placeholder updates to reflect which source is active.

BloodHound Edge Search

On the BloodHound page the edge search uses prefix matching — type Owns to find the Owns edge only, not AZOwns. Type AZ to see all Azure edges.
Switch to Collectors to pick SharpHound / BloodHound-Python / RustHound and see that collector's syntax inline.

Variables

Click Variables in the sidebar to fill placeholders like <domain>, <dc-ip>, <password> across every code block on the page. Values carry over between pages for the whole session. Edit All lets you update every saved value at once. Clear resets them all.

Distro Toggle

Controls the command style used in impacket code blocks.
Kali — impacket-secretsdump
Exegol — secretsdump.py
Script — python3 secretsdump.py

Tools Toggle (Impacket / GoPacket)

Switches between the Python impacket toolkit and its Go equivalent.
Impacket — standard Python tools, sidebar shows the Impacket reference
GoPacket — replaces every impacket- / secretsdump.py / python3 … with gopacket-secretsdump style, sidebar switches to the GoPacket reference. Distro selection is ignored when GoPacket is active.