Enumeration from Windows Host
PowerHuntShares
PingCastle
Purple Knight
Forest Druid
AD Recon
Adalanche
ADcheck
Harden Sysvol
ScriptSentry
Powershell Script


GUI
DC from the current domain

Scan Network for Admin Access - Amnesiac

ActiveDirectory PowerShell Module
MS signed and works even in PowerShell CLM
Current domain
Object of another domain
SID of the current domain
DC for the current domain
DC for another domain
Users
Search for a particular string in a user's attribute
Group membership for a user
Computers
OU
ACL
Trusts
TrustsGroups
Backup Operators
"admin" in name
Domain Admins
PowerView
Command
Description
Export-PowerViewCSV
Append results to a CSV file
ConvertTo-SID
Convert a User or group name to its SID value
Get-DomainSPNTicket
Requests the Kerberos ticket for a specified Service Principal Name (SPN) account
Domain/LDAP Functions:
Get-Domain
Will return the AD object for the current (or specified) domain
Get-DomainController
Return a list of the Domain Controllers for the specified domain
Get-DomainUser
Will return all users or specific user objects in AD
Get-DomainComputer
Will return all computers or specific computer objects in AD
Get-DomainGroup
Will return all groups or specific group objects in AD
Get-DomainOU
Search for all or specific OU objects in AD
Find-InterestingDomainAcl
Finds object ACLs in the domain with modification rights set to non-built in objects
Get-DomainGroupMember
Will return the members of a specific domain group
Get-DomainFileServer
Returns a list of servers likely functioning as file servers
Get-DomainDFSShare
Returns a list of all distributed file systems for the current (or specified) domain
GPO Functions:
Get-DomainGPO
Will return all GPOs or specific GPO objects in AD
Get-DomainPolicy
Returns the default domain policy or the domain controller policy for the current domain
Computer Enumeration Functions:
Get-NetLocalGroup
Enumerates local groups on the local or a remote machine
Get-NetLocalGroupMember
Enumerates members of a specific local group
Get-NetShare
Returns open shares on the local (or a remote) machine
Get-NetSession
Will return session information for the local (or a remote) machine
Test-AdminAccess
Tests if the current user has administrative access to the local (or a remote) machine
Threaded 'Meta'-Functions:
Find-DomainUserLocation
Finds machines where specific users are logged in
Find-DomainShare
Finds reachable shares on domain machines
Find-InterestingDomainShareFile
Searches for files matching specific criteria on readable shares in the domain
Find-LocalAdminAccess
Find machines on the local domain where the current user has local administrator access
Domain Trust Functions:
Get-DomainTrust
Returns domain trusts for the current domain or a specified domain
Get-ForestTrust
Returns all forest trusts for the current forest or a specified forest
Get-DomainForeignUser
Enumerates users who are in groups outside of the user's domain
Get-DomainForeignGroupMember
Enumerates groups with users outside of the group's domain and returns each foreign member
Get-DomainTrustMapping
Will enumerate all trusts for the current domain and any others seen.
Current domain
Object of another domain
SID of the current domain
Domain policy of the current domain
Domain policy of another domain
DC for the current domain
DC for another domain
Users
Search for a particular string in a user's attribute
Group membership for a user
Local Admins
Logged users
Check for Fake Potato or LeakedWallpaper
EnumerationOther methods: LoggedOn Users
Users with SPN - Kerberoast
KerberoastComputers
Groups
"admin" in name
Domain Admins members
Local Groups
Shares and sensitive files
GPO
Users which are in a local group of a machine
Machines where the given user is member of a specific group
MisconfigurationOU
GPO applied on an OU - Read GPOname from gplink attribute for GET-DomainOU
Users which are in a local group of a machine in any OU using GPO
ACL
ACLTrusts
TrustsLocal Admin Access
Machines in the current domain where the current user has local admin access
RPC and SMB blocked. See Find-WMILocalAdminAccess.ps1 and Find-PSRemotingLocalAdminAccess.ps1
Domain Admin Sessions
SharpView
User
Cable
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation
ADAPE
SharpADWS
LoggedOn Users
Check for Fake Potato or LeakedWallpaper
EnumerationWindows
Or with PowerView
Linux
NXC or:

Source: https://x.com/Geiseric4/status/1719764121111908510?t=sf2jp5riEIGPwaWIQKbHgg&s=09
Last updated