> cat /dev/github | grep security-tools
discovered 30 Mar 2026

Active-Directory-Exploitation-Cheat-Sheet

PowerShell ★ 2704 via github-topic
→ View on GitHub

AI Summary: The Active Directory Exploitation Cheat Sheet serves as a comprehensive resource for cybersecurity professionals, detailing methodologies and commands for navigating the Active Directory environment. Its primary use case involves facilitating reconnaissance, privilege escalation, and lateral movement within a network through structured commands using Powershell and .Net. Notable features include a systematic approach to various stages of the exploitation process, including domain enumeration, persistence techniques, and monitoring account vulnerabilities.


README

Active Directory Cheat Sheet

This repository contains a general methodology in the Active Directory environment. It is offered with a selection of quick commands from the most efficient tools based on Powershell, C, .Net 3.5 and .Net 4.5.


General Process:

  • Recon
  • Domain Enum
  • Local Privilege Escalation
  • Local Account Stealing
  • Monitor Potential Incoming Account
  • Local Account Stealing
  • Admin Recon
  • Lateral Movement
  • Remote Administration
  • Domain Admin Privileges
  • Cross Trust Attacks
  • Persistance and Exfiltrate

Active Directory Kill Chain:

Process

Cheat Sheet Tree:


Contribution, Proposal, Issue: