ADMR
Active Directory Mindmap Recipes: A Compromise à la Carte
Table of Contents
Loading contents...
README.md
ADMR – Active Directory Mindmap Recipes
Compromise, à la carte.
📌 Table of Contents
- Overview
- Project Goals
- Mindmap Preview
- Structure & Logic
- How to Use
- Emoji Code System
- Contributing
- Authors
- License
- Acknowledgments
🧾 Overview
ADMR is an interactive mindmap base on obsidian designed to support Active Directory pentesting.
It organizes attacks based on context and follows a clear logic: input → action → output.
Inspired by existing projects like the OCD mindmap and Hacker Recipes, ADMR is built to be more readable, clickable, and practical for real-world use in everyday pentest assessments.
🎯 Project Goals
- Structure AD attack paths in a logical and contextualized way
- Provide a fast, visual, and interactive reference
- Enable easy access to theory, tools, and tested commands
- Be offline-ready, customizable, and open-source
- Save time during engagements with less searching and more acting
🧩 Mindmap Preview
🧱 Structure & Logic
🔹 Organized by context:
Each main node represents a specific situation during an engagement. For example:
- 🔒 NO CREDENTIALS VULNS
- 👤 GOT USERNAME
- 🔑 GOT CREDENTIALS
- 🌀 GOT LOW ACCESS
- 🖥️ GOT LOCAL ADMIN
- 🏰 GOT DOMAIN ADMIN
- 📜 ADCS ABUSE
- 🔓 CRACKING HASH
- 🎫 KERBEROS DELEGATION ABUSE
- ↔️ LATERAL MOVE
- 📡 MITM (LISTEN & RELAY)
- ❓ NEED CREDENTIALS VULNS
- 🛡️ PERMISSIONS ABUSE
- 📌 PERSISTENCE
- 🤝 TRUST ABUSE
🔹 Each attack includes:
- 📚 Theory → Useful links to quality resources
- 🛠 Tools → Tools used for exploitation
- 💻 Command list → Tested commands ready for use
- 🔖 Emoji tags to assess priority and risk
💻 How to Use
- git clone the repo
- Open the folder as Obsidian vault
- Explore by context depending on your engagement progress
- Review theory, commands, and tools
- Modify or extend with your own findings
🔖 Emoji Code System
Attack Types
- 🔥 Quick wins – Easy, fast, low-noise attacks
- 💥 CVE – Public vulnerabilities
- 🚨 Can break things – Risky or noisy techniques
- 🛠️ Work in progress – Still being tested or improved
Tool Tags
- ⚪ Linux commands
- ⚫ CMD (Windows)
- 🔵 PowerShell
- 🟣 Impacket
- 🔴 BloodHound
- 🕷️ NetExec
- Ⓜ️ Metasploit
🤝 Contributing
We welcome contributions! You can:
- Add new attack techniques
- Improve existing sections
- Suggest changes or refactors
- Fix typos or dead links
- Enhance structure or styling
📬 Open a pull request or create an issue 💬
👥 Authors
- Amine B. (@gr0bot)
- Evariste Gwanulaga (@bl4ckarch)
📄 License
This project is licensed under the GNU GENERAL PUBLIC LICENSE Version 3.
Feel free to use, modify, and share — just give credit when you do.
🙏 Acknowledgments
Big thanks to the following for their inspiration and contributions to the field:
- Orange Cyberdefense – for the original AD mindmap
- Hacker Recipes – for structuring practical attack workflows
- Ecole 2600
Tool Information
Author
Imp0sters
Project Added On
May 28, 2025
License
Open Source