l4rm4nd

An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD domain. Evades EDR detections through ADWS.

46
2
100% credibility
Found Feb 21, 2026 at 23 stars 2x -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

A security tool that quietly scans Microsoft Active Directory networks to generate detailed reports on users, groups, computers, and potential vulnerabilities for penetration testers and auditors.

How It Works

1
🔍 Discover the security scanner

You hear about a quiet tool that checks company networks for weak spots without raising alarms.

2
📥 Get it ready

Download the simple program and set it up on your computer in a few minutes.

3
🔑 Add your test login

Enter the network address and a test username with password to connect safely.

4
🚀 Launch the quiet scan

Hit start and watch it silently explore the network, finding users, groups, and risks.

5
Review the findings

It gathers everything and creates easy charts showing security issues.

📊 Get your report

Open colorful spreadsheets and web pages with a full picture of network safety to share with your team.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 23 to 46 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is PyADRecon-ADWS?

PyADRecon-ADWS is a Python3 tool that performs Active Directory reconnaissance by querying ADWS over TCP/9389 instead of LDAP, helping evade EDR detection during domain enumeration. It generates individual CSV files for modules like users, groups, computers, and trusts, plus a consolidated XLSX report and interactive HTML dashboard with security findings. Install via pipx from PyPI or python3 github install for the latest commit, with Docker support and venv-friendly setup.

Why is it gaining traction?

It stands out for stealthy ADWS queries that slip past EDR tools monitoring LDAP traffic, while offering granular control over collection modules via CLI flags like --collect users,groups. The output—per-module CSVs, Excel summaries, and HTML visuals—beats raw dumps from alternatives, and it runs cleanly on python3 github kali linux or termux setups. Kerberos/NTLM auth flexibility and standalone Excel generation from existing CSVs add practical edges for quick domain audits.

Who should use this?

Red teamers and pentesters enumerating AD domains without tripping EDR alerts, especially in engagements needing fast, low-noise recon. Blue teams validating AD security posture via CSV/Excel exports for analysis. Anyone scripting ADWS workflows in python github package ecosystems or CI via python3 github action.

Verdict

Solid niche pick for EDR-evasive AD recon despite low 19 stars and 1.0% credibility score—docs are thorough but beta features like the dashboard need vetting. Grab it for targeted pentests if you're okay with multi-domain forest quirks; skip for production without more testing.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.