ADMR

ADMR

114 Stars

Active Directory Mindmap Recipes: A Compromise à la Carte

Imp0sters
May 28, 2025
114 stars
Category
Active-directory
GitHub Stars
114
Project Added On
May 28, 2025
Contributors
2

ADMR – Active Directory Mindmap Recipes

Compromise, à la carte.


📌 Table of Contents

  1. Overview
  2. Project Goals
  3. Mindmap Preview
  4. Structure & Logic
  5. How to Use
  6. Emoji Code System
  7. Contributing
  8. Authors
  9. License
  10. Acknowledgments

🧾 Overview

ADMR is an interactive mindmap base on obsidian designed to support Active Directory pentesting.
It organizes attacks based on context and follows a clear logic: input → action → output.

Inspired by existing projects like the OCD mindmap and Hacker Recipes, ADMR is built to be more readable, clickable, and practical for real-world use in everyday pentest assessments.


🎯 Project Goals

  • Structure AD attack paths in a logical and contextualized way
  • Provide a fast, visual, and interactive reference
  • Enable easy access to theory, tools, and tested commands
  • Be offline-ready, customizable, and open-source
  • Save time during engagements with less searching and more acting

🧩 Mindmap Preview

interactive view


🧱 Structure & Logic

🔹 Organized by context:

Each main node represents a specific situation during an engagement. For example:
- 🔒 NO CREDENTIALS VULNS
- 👤 GOT USERNAME
- 🔑 GOT CREDENTIALS
- 🌀 GOT LOW ACCESS
- 🖥️ GOT LOCAL ADMIN
- 🏰 GOT DOMAIN ADMIN
- 📜 ADCS ABUSE
- 🔓 CRACKING HASH
- 🎫 KERBEROS DELEGATION ABUSE
- ↔️ LATERAL MOVE
- 📡 MITM (LISTEN & RELAY)
- ❓ NEED CREDENTIALS VULNS
- 🛡️ PERMISSIONS ABUSE
- 📌 PERSISTENCE
- 🤝 TRUST ABUSE

🔹 Each attack includes:

  • 📚 Theory → Useful links to quality resources
  • 🛠 Tools → Tools used for exploitation
  • 💻 Command list → Tested commands ready for use
  • 🔖 Emoji tags to assess priority and risk

💻 How to Use

  • git clone the repo
  • Open the folder as Obsidian vault
  • Explore by context depending on your engagement progress
  • Review theory, commands, and tools
  • Modify or extend with your own findings

🔖 Emoji Code System

Attack Types

  • 🔥 Quick wins – Easy, fast, low-noise attacks
  • 💥 CVE – Public vulnerabilities
  • 🚨 Can break things – Risky or noisy techniques
  • 🛠️ Work in progress – Still being tested or improved

Tool Tags

  • ⚪ Linux commands
  • ⚫ CMD (Windows)
  • 🔵 PowerShell
  • 🟣 Impacket
  • 🔴 BloodHound
  • 🕷️ NetExec
  • Ⓜ️ Metasploit

🤝 Contributing

We welcome contributions! You can:

  • Add new attack techniques
  • Improve existing sections
  • Suggest changes or refactors
  • Fix typos or dead links
  • Enhance structure or styling

📬 Open a pull request or create an issue 💬


👥 Authors


📄 License

This project is licensed under the GNU GENERAL PUBLIC LICENSE Version 3.
Feel free to use, modify, and share — just give credit when you do.


🙏 Acknowledgments

Big thanks to the following for their inspiration and contributions to the field:

Tool Information

Author

Imp0sters

Project Added On

May 28, 2025

License

Open Source

Tags

security tool