image
BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time. Full User Guide and Info Commands NONE : At this time all items of the script are configured in the .ps1 files. Files are outlined on the User Guide on Secframe.com Acknowledgments I'd like to send thanks to the countless people who wanted this as a product and waited while I made it! Screenshots Installation Requirements: Domain Admin and Schema Admin permissions Active Directory Powershell Installed Running On Windows: clone the repo git clone https://github.com/davidprowe/badblood.git Run Invoke-badblood.ps1 ./badblood/invoke-badblood.ps1 Talk About the BadBlood Message or Follow me on twitter @ davidprowe Drop a note on secframe.com I am not responsible for cleanup if this is run in a production domain Disclaimer Please note: all tools/ scripts in this repo are released for use "AS IS" without any warranties of any kind, including, but not limited to their installation, use, or performance. We disclaim any and all…

Source