Skip to content

Latest commit

 

History

History
37 lines (25 loc) · 2.33 KB

readme.MD

File metadata and controls

37 lines (25 loc) · 2.33 KB

Adalanche Open Source

Active Directory ACL Visualizer and Explorer

GitHub release (latest SemVer) GitHub all releases GitHub Workflow Status

Sample Adalanche Graph using the GOAD lab

Adalanche gives instant results, showing you what permissions users and groups have in an Active Directory. It is useful for visualizing and exploring who can take over accounts, machines or the entire domain, and can be used to find and show misconfigurations.

I Can Haz Domain Admin?

Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people are just added to Domain Admins.

In large organizations you have a huge number of people with different needs, and they are delegated access to varying degrees of power in the AD. At some point in time, someone makes a mistake, and that can cost you dearly.

Adalanche visualizes delegation issues, kerberoastable accounts, AD CS issues and more.

Features

Collection: Native collection from Active Directory, Windows machines, VMware vSphere* Analysis: In-depth analysis of ownership, ACLs and other node , including users, groups, computers, and more. Visualization: allows you to explore nodes and edges via web based graph UI Integrates data from:

  • On-Premises Active Directory
  • Windows Computers (domain joined)
  • VMware vSphere*
  • CyberArk*
  • Password hashes / cracked passwords*
  • Tiering models*
  • Custom nodes and edges* Reporting: in development*
  • = paid version

Tell me more

Since the documentation has gotten comprehensive, it's moved to it's own place. You can look through it here on GitHub, and it's also available from within the Adalanche UI when you get started.