Red Specter DOMINION
Pure Python Active Directory Attack Framework — 9 modules. 1,866 tests. 4 protocols. Zero .NET dependencies.
Overview
DOMINION is a pure Python Active Directory attack framework. Every protocol — LDAP, Kerberos, SMB, DRSUAPI — implemented from scratch using Python's socket, struct, and ssl modules. No Impacket. No .NET. No PowerShell. No Rubeus. No Mimikatz. Pure engineering.
Nine modules. 1,866 tests. DOMINION enumerates Active Directory, maps attack paths to Domain Admin, exploits Kerberos and NTLM weaknesses, extracts secrets via DCSync, moves laterally across the domain, and establishes persistence — all from a single pure Python tool.
Installation
Also available as .deb and PKGBUILD (BlackArch).
Or from source:
Quick Start
ENUMERATE — AD Enumeration
Full Active Directory enumeration via native LDAP implementation. 50+ built-in queries for users, groups, computers, trusts, GPOs, SPNs, OUs, and ACLs.
- 50+ LDAP queries built in — users, groups, computers, trusts, GPOs, SPNs, OUs
- DC discovery via DNS SRV records and LDAP ping
- Recursive group membership resolution
- Kerberos pre-auth status detection (AS-REP roast targets)
- SPN enumeration for Kerberoast targets
- 50+ well-known SIDs for privilege mapping
- 19+ privileged groups identified automatically
- BloodHound-compatible JSON export
PATHFIND — Attack Path Mapping
BloodHound-style attack path discovery. Shortest path to Domain Admin through ACL chains, delegation abuse, trust relationships, and group nesting.
- Graph-based pathfinding with BFS/Dijkstra algorithms
- Shortest path to DA through ACL, delegation, trust, and group paths
- Exploitability scoring per path step
- Multi-path discovery — all paths, not just shortest
- Path validation against current credentials and permissions
KERBEROS — Kerberos Attacks
Pure Python Kerberos implementation. ASN.1 message construction, RC4-HMAC encryption, and full attack coverage — Kerberoast, AS-REP Roast, Golden/Silver Tickets, S4U delegation abuse.
Request TGS tickets for accounts with SPNs set. Extract RC4-HMAC encrypted tickets for offline cracking with GHOUL. Pure Python TGS-REQ construction.
- SPN enumeration via LDAP
- TGS ticket request via native Kerberos
- Hash extraction in hashcat/john format
- MITRE ATT&CK: T1558.003
Target accounts with Kerberos pre-authentication disabled. Request AS-REP without credentials and extract hashes for offline cracking.
- Pre-auth disabled detection via LDAP UAC flags
- AS-REQ without credentials
- Hash extraction for GHOUL cracking
- MITRE ATT&CK: T1558.004
Forge Kerberos tickets using extracted krbtgt or service account hashes. Golden Ticket provides unrestricted domain access. Silver Ticket targets individual services.
- Golden Ticket — forge TGT with krbtgt hash (T1558.001)
- Silver Ticket — forge TGS with service account hash (T1558.002)
- S4U delegation abuse — constrained/unconstrained/RBCD
NTLM — NTLM Attacks
Pure Python NTLM implementation. Pass-the-Hash, NTLM relay, NTLMv2 capture. Challenge-response authentication built from protocol specification.
- Pass-the-Hash — authenticate with NTLM hash, no plaintext needed (T1550.002)
- NTLM relay — relay authentication to LDAP, SMB, HTTP, MSSQL (T1557.001)
- NTLMv2 capture — capture challenge-response for offline cracking
- Pure Python NTLMSSP implementation
SECRETS — Credential Extraction
Domain secret extraction via DCSync and direct database parsing. Pure Python DRSUAPI implementation for domain replication.
- DCSync — replicate domain via DRSUAPI DRSGetNCChanges (T1003.006)
- SAM extraction — local account hashes
- LSA secrets — service account passwords, cached credentials
- DPAPI master keys — decrypt user secrets
- NTDS.dit parsing — offline hash extraction
- LAPS passwords — local admin password retrieval
- gMSA passwords — group managed service account extraction
GPO — Group Policy Abuse
Group Policy exploitation. GPP password extraction, GPO modification for code execution, and scheduled task creation via policy.
- GPP password extraction from SYSVOL (cPassword decryption)
- GPO modification for immediate code execution (UNLEASHED)
- Scheduled task creation via Group Policy
- Registry modification through policy
ACL — ACL Abuse
ACL analysis and exploitation. 17+ dangerous ACE types identified. Shadow Credentials and AD CS abuse (ESC1-ESC8).
- WriteDACL — modify permissions on any object
- GenericAll — full control over target object
- GenericWrite — write any attribute
- WriteOwner — change object ownership
- Shadow Credentials via msDS-KeyCredentialLink
- AD CS abuse — ESC1 through ESC8 certificate template exploitation
- ForceChangePassword — reset user passwords
- AddMember — add users to privileged groups
LATERAL — Lateral Movement
Pure Python lateral movement across Active Directory. Six execution methods implemented from protocol specifications.
- WMI — Windows Management Instrumentation execution (T1047)
- WinRM — Windows Remote Management (T1021.006)
- PSExec — service-based execution via SMB (T1569.002)
- DCOM — Distributed COM execution (T1021.003)
- smbexec — SMB-based command execution
- atexec — scheduled task execution
PERSIST — Domain Persistence
Domain persistence mechanisms. All UNLEASHED only — these operations modify Active Directory.
- Golden Ticket — forge TGT for unrestricted access (T1558.001)
- Silver Ticket — forge TGS for service access (T1558.002)
- Skeleton Key — patch LSASS for master password (T1556.001)
- DCShadow — register rogue DC for stealthy changes (T1207)
- SID History — inject SIDs for cross-domain access (T1134.005)
- AdminSDHolder — persistent privileged access
- Machine account quota exploitation for RBCD
DOMINION UNLEASHED
Cryptographic override. Private key controlled. One operator. Founder's machine only.
Standard mode enumerates and assesses. UNLEASHED mode executes attacks. DCSync, Golden Tickets, ACL exploitation, lateral movement, persistence — all require UNLEASHED.
| Capability | Standard | UNLEASHED |
|---|---|---|
| Enumeration | Full LDAP | Full + recursive + BloodHound |
| Kerberoast | Identify SPNs | Request tickets, extract hashes |
| DCSync | Check privileges | Full domain replication |
| Golden Ticket | Check requirements | Forge and inject |
| ACL abuse | Identify ACEs | Execute exploitation |
| Lateral movement | Identify targets | Execute WMI/PSExec/WinRM |
| Persistence | Document methods | Deploy mechanisms |
| Key required | No | Ed25519 |
UNLEASHED mode is restricted to authorised operators with Ed25519 private key access.
The key must be present at ~/.redspecter/override_private.pem.
Both --override and --confirm-destroy flags are required.
The gate is cryptographic. There is no bypass. Executing attacks against Active Directory
will modify domain objects and may disrupt production services.
CLI Reference
Commands
| Command | Description |
|---|---|
| dominion enumerate | Full domain enumeration |
| dominion users | Enumerate domain users |
| dominion groups | Enumerate groups and memberships |
| dominion computers | Enumerate computer objects |
| dominion trusts | Enumerate domain trusts |
| dominion pathfind | Map attack paths to target |
| dominion kerberoast | Kerberoast — extract TGS hashes |
| dominion asreproast | AS-REP Roast — extract AS-REP hashes |
| dominion dcsync | DCSync — domain replication (UNLEASHED) |
| dominion secrets | Extract LAPS, gMSA, LSA, DPAPI |
| dominion gpo | GPO enumeration and exploitation |
| dominion acl | ACL analysis and exploitation |
| dominion lateral | Lateral movement execution (UNLEASHED) |
| dominion persist | Persistence deployment (UNLEASHED) |
| dominion bloodhound | BloodHound-compatible JSON export |
Connection Options
| Flag | Description |
|---|---|
| --dc | Domain controller hostname or IP |
| --domain | Domain FQDN |
| --user | Username for authentication |
| --password | Password for authentication |
| --hash | NTLM hash for Pass-the-Hash |
| --ticket | Kerberos ticket (.ccache) for auth |
| --ldaps | Use LDAPS (port 636) |
| --override | UNLEASHED dry-run |
| --confirm-destroy | UNLEASHED live execution |
| --output | Output directory for results |
Kill Chain Integration
DOMINION operates as the final stage in the Red Specter traditional infrastructure attack chain. WRAITH finds. REAPER exploits. GHOUL cracks. DOMINION conquers the domain.
API Reference
DOMINION exposes a Python API for programmatic integration.
Disclaimer
Red Specter DOMINION is designed for authorised security testing, research, and educational purposes only. You must have explicit written permission from the domain owner before running any DOMINION tool against Active Directory. DOMINION operations — especially DCSync, lateral movement, and persistence — will modify domain objects and may disrupt production services. Testing must only be performed against systems you are authorised to test. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation in your jurisdiction. The authors accept no liability for misuse or damage resulting from improper use.