mverschu

Active Directory information dumper via ADWS for evasion purposes.

174
11
69% credibility
Found Feb 17, 2026 at 87 stars 2x -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

A program that connects to company network servers to extract and display lists of users, groups, computers, policies, and trusts in readable formats.

How It Works

1
🔍 Discover the Tool

You hear about a helpful program that lets you peek inside company networks to list users, computers, and security rules safely.

2
📥 Get It Ready

Download and set it up on your computer with a simple one-line command, like adding a new app.

3
🔑 Gather Login Info

Collect your network username, password, and the address of the main server you want to check.

4
▶️ Start the Check

Run the program, enter your details, and let it connect to quietly gather network details without alerts.

5
See the Magic Happen

Watch as it pulls together lists of everyone and everything on the network into easy-to-read files.

6
📂 Explore Your Reports

Open colorful web pages or simple lists showing users, groups, computers, and security settings.

Know Your Network

You now have a clear map of the network setup, ready to spot weaknesses or understand it better.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 87 to 174 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is adwsdomaindump?

Python tool for dumping Active Directory domain services data—users, groups, computers, trusts, policies—over ADWS (port 9389) instead of monitored LDAP. Feed it domain creds and a DC hostname via CLI like `adwsdomaindump -u user -p pass dc.example.com`, get browsable HTML reports, BloodHound-ready JSON, and grepable TSVs. Perfect for active directory users and computers enumeration without the usual noise.

Why is it gaining traction?

Bypasses EDR like Microsoft Defender for Endpoint and CrowdStrike Falcon by skipping LDAP entirely—ADWS flies under most radars. Pipx install, minimal deps (impacket, dnspython), and extras like `adwsd2bloodhound` for graphs or `adwsd2pretty` for quick scans hook pentesters fast. Active GitHub forks and low-key stars signal real-world tweaks for evasion in active directory windows 11 environments.

Who should use this?

Red teamers hitting Active Directory during engagements where LDAP triggers alerts. Pentesters mapping domain trusts or machine accounts in hybrid active directory linux setups. Defenders simulating attacks to spot ADWS blind spots, especially post active directory papierkorb cleanup tests.

Verdict

Grab it for ADWS recon if LDAPDomainDump gets blocked—outputs are immediately usable. 45 stars and 0.699999988079071% credibility score show it's niche and maturing; solid README but watch for edge cases in large domains. MIT-licensed Python makes testing painless.

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.