BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enumeration and exploitation of AD misconfigurations using tools like Impacket, nxc, Certipy, and BloodyAD.
- Full session management with tagging, environment grouping
- Authenticated and anonymous AD enumeration (users, groups, GMSA, trusts, etc.)
- Post-exploitation modules: GenericAll, DCSync, WriteSPN, ExtraSID, Silver Tickets, and more
- Session import/export in JSON format
- auth support for plaintext, NTLM hash
- AD Certificate Services (AD CS) enumeration and ESC1–ESC16 exploitation
- Interactive shell with custom command aliases and auto-prompt formatting
- Tools for loot parsing, ticket inspection, hash extraction, and more
git clone https://github.com/ahmadallobani/BaldHead.git
cd BaldHeadsudo apt install pipx
pipx install impacket
pipx install certipy-ad
pipx ensurepathsudo apt install bloodyadsudo apt install smbclient ldap-utils nmap ftp xfreerdp3python3 baldhead.pysession
add <pass_or_hash> [domain] [ip] [dc_ip] [--env ENV] [--tags tag1,tag2] [--notes "msg"] Add a session. Example: session add admin1 Administrator 'P@ssw0rd' auth.lab 10.0.0.5
use - Switch to session by name list [filters] - List all sessions. Optional: --domain, --ip, --env, --username export [file] - Save current sessions to a file import [file] - Load sessions from a file clear - Delete all sessions
help # General help
help session # Session commands
help attack # All attacks
help adcs # AD CS exploitation
help enum # Enumeration modules
help setup # setup the Environment
help tools # Loot & utility toolssession add s1 administrator 'Pass123!' auth.lab 192.168.56.10
session list
session use
session delattack kerberoast
attack dcsync
attack shadow
attack rbcdenum users
enum delegation
enum anon 192.168.56.10adcs enum
adcs esc1
adcs esc16| Command | Description |
|---|---|
setup |
Set defaults for domain, IP, and DC |
session |
Manage sessions, Kerberos tickets, tags |
connect |
SMB, WinRM, RDP, PsExec, FTP |
attack |
All supported AD privilege escalation and abuse modules |
enum |
LDAP and network enumeration |
adcs |
Enumerate and abuse vulnerable certificate templates and CAs |
tools |
Loot inspection, hash parsing, ticket conversion |
debug |
Diagnose paths, config, DNS, and session issues |
users,groups,computers,delegation,trusted,kerberoast,gmsa, etc.anon <target>— enum4linux-style check with SMB, FTP, and Nmap
kerberoast,asrep,dcsync,shadow,rbcd,writespn,forge_silver,enableuser, etc.
enum(CA and templates)esc1toesc16for exploiting misconfigured templates, cert relaying, and shadow credentials
loot— list loot filesparsehashes— extract hashes from logschecktickets— inspect Kerberos ticketsconvert_ticket— convert kirbi/ccacheopen <file>— view loot filegrepusers <file>— extract usernames
baldhead/
│
├── core/ # Session, helpers, color, helptext
├── commands/ # Command handlers for each group
├── modules/ # All attack and enum modules
├── loot/ # Captured output and artifacts
├── baldhead.py # Main entrypoint
├── README.md
- Ahmad Allobani — @ahmadallobani
BaldHead v1.0
Initial release — session management, core modules, and command interface fully operational.