PingCastle
馃敟 Offensive Ops 路 C#
PingCastle performs rapid Active Directory security assessments by analyzing domain configuration, trust relationships, user accounts, group policies, and delegation settings. It produces a comprehensive risk score across four categories: stale objects, privileged accounts, trust relationships, and anomalies. PingCastle identifies password policy weaknesses, dangerous delegations, abandoned admin accounts, SMB signing issues, and dozens of other AD security concerns. Reports are generated as interactive HTML with remediation priorities. It runs without elevated privileges and completes assessments in minutes even on large domains.
Installation
$ git clone https://github.com/netwrix/pingcastle.gitUse Cases
- Rapid Active Directory security health assessment
- Identifying dangerous trust relationships and delegations
- Generating executive risk reports for AD environments
- Finding stale objects and abandoned privileged accounts
Tags
Details
- Category
- 馃敟 Offensive Ops
- Language
- C#
- Repository
- netwrix/pingcastle
- Platforms
- 馃獰windows
Links
Used in 1 Workflow
Community Reviews
Alternatives & Comparisons
BloodHound
GoActive Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Compare PingCastle vs BloodHoundCrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Compare PingCastle vs CrackMapExecMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.