fkad is a small offensive helper script designed for exegol docker containers and pentesting instances. It automates common enumeration and sanity checks and prepares artifacts for follow-up toolkits.
wget https://raw.githubusercontent.com/fkxdr/fkad/refs/heads/main/fkad.sh
chmod +x fkad.sh
./fkad.sh -u <user> -p '<password>' -d <dc-ip>
Example:
./fkad.sh -u pentest1 -p 'Pentestpassword123' -d 10.10.2.13fkad creates a timestamped output directory within the workspace:
/workspace/fkad_<domain>_YYYYMMDD_HHMMSS
Inside you will find:
domain_users.txt- active users enumerated from the domainowned.txt- single-line credential entry used by GriffonAD (format:SAM:TYPE:SECRETfor users; computers require hex secret).*.json- BloodHound JSON files.griffon_output.txt/griffon_paths.txt— GriffonAD results
Note
When copying the Griffon commands printed in shell, prefer the one with expanded filenames if your shell rejects unexpanded globs.
bloodhound-python(orbloodhound.py) for collecting JSONs.ldapsearch,nxctool (or equivalent SMB/LDAP discovery) installed and in$PATH.python3for running GriffonAD if available.- Optional:
certipy,krbrelayx,kerbrutefor extended checks and follow-ups.
This tool is for authorized security testing, research, and defensive validation only. Do not use it against systems you do not own or do not have explicit permission to test. The author is not responsible for misuse.
Built to glue common AD tooling and automate mundane enumeration tasks:
- Ghost SPNs - Semperis
- BloodHound / bloodhound-python
- GriffonAD (for attack path analysis)
- Certipy (ADCS checks)
- krbrelayx (DNS tests)
- kebrute - ropnop
