l4rm4nd

l4rm4nd / PyADRecon

Public

Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD domain.

51
3
100% credibility
Found Feb 08, 2026 at 21 stars 2x -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

PyADRecon collects detailed information from Microsoft Active Directory environments, such as users, groups, computers, and policies, and compiles it into spreadsheet reports.

How It Works

1
๐Ÿ” Discover the tool

You hear about PyADRecon, a helpful checker for Windows company networks that lists users, computers, and security rules.

2
๐Ÿ’ป Set it up

You download the tool and get it ready on your computer so it's all set to use.

3
๐Ÿ”— Connect to your network

You link the tool to your company's directory server by entering the server address and your admin login details.

4
๐Ÿ“‹ Choose what to check

You pick which parts of the network to review, like user lists, group setups, or security policies.

5
โ–ถ๏ธ Run the check

You start the tool and it quietly gathers all the details from the network.

6
๐Ÿ“Š View your report

You get a neat spreadsheet file packed with easy-to-read info about your entire network setup.

โœ… Secure insights gained

Now you have a complete picture of your company's network security to review and improve.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 21 to 51 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is PyADRecon?

PyADRecon is a Python3 implementation of ADRecon that reconnaissance your Active Directory domain, generating individual CSV files for users, groups, computers, trusts, and more, alongside a single XLSX report for easy analysis. It handles NTLM and Kerberos authentication, with options for TGT tickets via file or base64, and supports standalone mode to build Excel reports from existing CSVs without connecting to AD. Quick to set up via github python3 venv, pip install from requirements, or python3 github install on Kali Linux and Termux.

Why is it gaining traction?

It stands out as a native Python3 port of the PowerShell original, running smoothly on Linux without Wine, with Kerberos auth bypassing LDAP channel binding issues and default workstation spoofing dodging userWorkstations restrictions. Docker support via GHCR makes it dead simple for python3 github action or one-off runs, and selective collection via CLI flags like --collect users,groups keeps scans lightweight. The combo of CSV exports, Excel summaries, and auth flexibility hooks pentesters tired of clunky alternatives.

Who should use this?

Red teamers and pentesters enumerating AD domains during engagements, especially on Kali Linux or Termux where PowerShell falls short. Security auditors mapping environments for compliance, or defenders baselining their own AD with granular CSV/domain files. Skip if you're Windows-only and prefer the original.

Verdict

With 25 stars and a 1.0% credibility score, it's early-stage and lightly tested, but solid docs and MIT license make it worth a spin for Python3 AD recon needsโ€”clone, venv, and test on a lab domain first. Promising for github python3 download scenarios, just don't bet production audits on it yet.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.