CravateRouge
banner
cravaterouge.bsky.social
CravateRouge
@cravaterouge.bsky.social
Need a hand with your IT security? Send me a DM
See more on https://cravaterouge.com
Just pushed a new feature in bloodyAD v2.5.0 for 'get writable': you can now dump the results straight into a minimal BloodHound zip using --bh

Give it a spin and let me know what breaks 😄
October 29, 2025 at 8:02 AM
For all the CTF fans who don't want to manually exploit long and easy AD privesc paths, autobloody has been finally updated to its 1.0.0 version
October 22, 2025 at 5:29 AM
Explore the AD DS even more using MSLDAP operations with bloodyAD 2.3.1:
"bloodyad [] msldap "

MSLDAP commands list:
github.com/CravateRouge...
User Guide
BloodyAD is an Active Directory Privilege Escalation Framework - CravateRouge/bloodyAD
github.com
October 14, 2025 at 7:12 AM
Struggling with cross-domain Kerberos? Not anymore, no matter the number of hops with kerbad v0.5.5 + bloodyAD v2.1.27:
www.linkedin.com/feed/update/...
Sign Up | LinkedIn
500 million+ members | Manage your professional identity. Build and engage with your professional network. Access knowledge, insights and opportunities.
www.linkedin.com
September 30, 2025 at 2:00 PM
Finally a bloodhound collector inter-domain in bloodyAD v2.1.25!

Thanks to the amazing work of @Skelsec (don't hesitate to support his project octopwn) and some custom code of mine named the reacher to reach every DC alive 😈
September 24, 2025 at 6:25 PM
I know some of you wanted it and JSON output is now available in bloodyAD v2.1.25 thanks to mHiluxS
September 23, 2025 at 5:54 AM
github.com/SySS-Researc... is really a bless for those who want to deploy BloodHound in one step
GitHub - SySS-Research/Single-User-BloodHound: Run BloodHound CE in a single-user setup with podman
Run BloodHound CE in a single-user setup with podman - GitHub - SySS-Research/Single-User-BloodHound: Run BloodHound CE in a single-user setup with podman
github.com
September 21, 2025 at 6:08 AM
Tired to deal with the clock skew for Kerberos so github.com/CravateRouge... will attempt to synchronize its clock to the server now
September 3, 2025 at 2:49 PM
New article for those curious about what they can find in the AD Recycle Bin (Bonus: I updated bloodyAD so you can play on this😉)
www.linkedin.com/feed/update/...
♻️Have You Looked in the Trash?♻️ | CravateRouge Ltd
♻️Have You Looked in the Trash?♻️ Our latest article uncovers how the Active Directory Recycle Bin can be a hidden attack surface. From SID History abuse to orphaned delegation paths, deleted objects...
www.linkedin.com
June 25, 2025 at 4:05 PM
Exploiting BadSuccessor from A to Z with NT hash of impersonated accounts using bloodyAD v2.1.16
github.com/CravateRouge...
May 27, 2025 at 9:54 AM
🎉 Happy Victory Day! 🎉

The latest update to bloodyAD makes the shadowcredentials attack even smarter:
www.linkedin.com/feed/update/...
Release v2.1.13 · CravateRouge/bloodyAD | CravateRouge Ltd
🎉 Happy Victory Day! 🎉 The latest update to bloodyAD makes the shadowcredentials attack even smarter! Now, it ensures the targeted Domain Controller (DC) has the prerequisites for a successful attack...
www.linkedin.com
May 8, 2025 at 12:38 PM
bloodyAD v2.1.8 is out with a new feature to resolve foreign SID when displaying security descriptors with "get object" or "get search" and a lifetime option on "add user" offered by
github.com/martanne
to make them vanish magically once expired

github.com/CravateRouge...
Release v2.1.8 · CravateRouge/bloodyAD
github.com
February 28, 2025 at 5:55 PM
Reposted by CravateRouge
BloodyAD offers flexible authentication options, including cleartext passwords, pass-the-hash, pass-the-ticket, and certificate-based authentication.

Read more: www.helpnetsecurity.com/2025/01/28/b...

#cybersecurity #cybersecuritynews #opensource
@cravaterouge.bsky.social
BloodyAD: Open-source Active Directory privilege escalation framework - Help Net Security
BloodyAD is an open-source Active Directory privilege escalation framework, often called the Swiss Army knife for AD privilege escalation.
www.helpnetsecurity.com
January 28, 2025 at 2:35 PM
Little gift just before Christmas 🎁
Learn how AD LDAP logging works, how to improve it or how to bypass it
Performing AD LDAP Queries Like a Ninja | CravateRouge Ltd
Strategies to minimize logging generation, and methods to enhance logging efficiency
cravaterouge.com
December 24, 2024 at 6:37 AM
Reposted by CravateRouge
🚀 Big Announcement! 🚀

After 8+ years of working on PayloadsAllTheThings, I’m excited to release it as an ebook on Leanpub! 📖✨

To celebrate, I’m gifting 2 free copies to random reposters! 🔥

👉 Repost for a chance to win

Thank you all for your incredible support! 🙌

#CyberSecurity #Infosec
Payloads All The Things
leanpub.com
December 1, 2024 at 4:16 PM
Working on making bloodyAD more cross-domain friendly.

You can now retrieve DNS records on all AD domains trusting yours using 'get dnsDump --transitive'
Cross-domain transitivity works even with kerberos credentials from your initial domain.
github.com/CravateRouge...
Release v2.1.5 · CravateRouge/bloodyAD
github.com
December 20, 2024 at 1:14 PM