Skip to main content

Active Directory Certificate Services enumeration and abuse

Project description

Certipy - AD CS Attack & Enumeration Toolkit

PyPI version Python License

Certipy is a powerful offensive and defensive toolkit for enumerating and abusing Active Directory Certificate Services (AD CS). It helps red teamers, penetration testers, and defenders assess AD CS misconfigurations - including full support for identifying and exploiting all known ESC1-ESC16 attack paths.

[!WARNING] Use only in environments where you have explicit authorization. Unauthorized use may be illegal.


🔍 Features

  • 🔎 Discover Certificate Authorities and Templates
  • 🚩 Identify misconfigurations
  • 🔐 Request and forge certificates
  • 🎭 Perform authentication using certificates
  • 📡 Relay NTLM authentication to AD CS HTTP(S)/RPC endpoints
  • 🗝️ Support for Shadow Credentials, Golden Certificates, and Certificate Mapping Attacks
  • 🧰 And much more!

📚 Full Wiki & Documentation

Read the full step-by-step usage guide, including installation, vulnerability explanations, examples, and mitigations in the 📘 Certipy Wiki.


⚙️ Installation

See the Installation Guide for instructions on how to install Certipy.


🚀 Quick Start

See the Quick Start Guide for a quick overview of the most common commands and usage examples.


🎯 Supported AD CS Vulnerabilities

Certipy supports detection and exploitation of AD CS vulnerabilities across the full range of ESC1-ESC16.

For detailed explanations and exploitation steps, refer to the Certipy Wiki.


📎 Resources

See the Resources for selection of key resources related to AD CS security.


🤝 Contributing

Contributions are welcome! See CONTRIBUTING.md for guidelines on reporting issues, improving documentation, or submitting pull requests.


🌟 Sponsors

Thanks to these generous sponsors for supporting the development of this project. Your contributions help sustain ongoing work and improvements.

User avatar: Henri SaloUser avatar: mxrchUser avatar: ClipsUser avatar:

👤 Author

Developed by @ly4k, with valuable contributions from the community.


📘 Wiki

📖 Visit the Certipy Wiki for detailed documentation, usage examples, ESC vulnerability breakdowns, and mitigation advice.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

certipy_ad-5.0.2.tar.gz (151.8 kB view details)

Uploaded Source

Built Distribution

certipy_ad-5.0.2-py3-none-any.whl (174.4 kB view details)

Uploaded Python 3

File details

Details for the file certipy_ad-5.0.2.tar.gz.

File metadata

  • Download URL: certipy_ad-5.0.2.tar.gz
  • Upload date:
  • Size: 151.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for certipy_ad-5.0.2.tar.gz
Algorithm Hash digest
SHA256 e6e6f00e27af81fd13b5bceaf0e2da131b403558b2fd0fd3de2d634cd9753df5
MD5 e66be1a8e2466f8912d3eaaa3fae27ac
BLAKE2b-256 8a927291890c5cdb90c95e21cad07f8f88243b34982b5c21a50bef7c7e267935

See more details on using hashes here.

File details

Details for the file certipy_ad-5.0.2-py3-none-any.whl.

File metadata

  • Download URL: certipy_ad-5.0.2-py3-none-any.whl
  • Upload date:
  • Size: 174.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for certipy_ad-5.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 1c0991878aa961c1ba9828305b58ae0ef677b2d9cce587ae46f2694d7e8384ae
MD5 bdd9df6bb07704a2e21a3cd6637a46ba
BLAKE2b-256 9e395623ee14581dae377765860dae986ec81e6d29a5c94c8489ec272c4bf086

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page