pentest-active-directoryAssess Active Directory identity attack paths including roasting, relay, and delegation abuse.
Install via ClawdBot CLI:
clawdbot install 0x-Professor/pentest-active-directoryGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://github.com/BloodHoundAD/BloodHoundAudited Apr 17, 2026 · audit v1.0
Generated Mar 20, 2026
Simulates an insider threat or compromised account scenario to test Active Directory security controls. Used by security teams to identify privilege escalation paths and lateral movement opportunities within a corporate network, ensuring detection and response mechanisms are effective.
Assesses Active Directory configurations against standards like NIST SP 800-115 or industry-specific regulations. Helps organizations in healthcare or government sectors validate identity management practices and report on security posture for audit purposes.
Used after a security incident to map attack paths and identify compromised accounts or misconfigurations in Active Directory. Enables IT teams to understand the breach scope and implement fixes to prevent recurrence.
Evaluates Active Directory environments during corporate mergers to identify vulnerabilities and attack paths before integrating networks. Ensures secure consolidation of identity systems and reduces risk from inherited security gaps.
Targets Active Directory in sectors like energy or utilities to test resilience against identity-based attacks. Focuses on preventing unauthorized access to operational technology systems through validated attack simulations.
Offers ongoing Active Directory security assessments as part of a subscription-based service. Generates revenue through monthly fees for monitoring, testing, and reporting to clients, with scalability across multiple organizations.
Provides one-time or project-based pentesting engagements for Active Directory environments. Revenue comes from fixed-price contracts or hourly billing, tailored to client needs such as compliance audits or incident response.
Hosts the skill as part of a cloud-based security testing platform accessible via web interface. Monetizes through tiered pricing plans based on usage, number of scans, or features, targeting small to medium businesses.
💬 Integration Tip
Ensure scope.json is properly formatted per the shared schema and use dry-run mode initially to validate checks without live execution.
Scored Apr 19, 2026
Track water and sleep with JSON file storage
Perform advanced filesystem tasks including listing, recursive searching by name or content, batch copying/moving/deleting files, and analyzing directory siz...
OpenClaw自动化文件管理助手,用于批量文件操作、智能分类、重复文件清理、文件重命名、目录同步等任务。当用户需要整理文件、批量重命名、清理重复文件、同步目录或自动化文件工作流时使用此技能。
Advanced filesystem operations - listing, searching, batch processing, and directory analysis for Clawdbot
Set up scheduled automated backups with version tracking and cleanup. Use when users need to (1) Schedule periodic backups of directories or files, (2) Monit...
Parse and generate RFC 4180 compliant CSV that works across tools.