Scripts, EXEs, and CLI tools to audit, clean, and secure your AD like a pro.
Handcrafted by KuroStrike. Battle-tested in real-world engagements.
Complete GUI tool for GPO cleanup, privileged account mapping, and reporting.
Fast GPO anomaly scanner — no module required. Lightweight & CLI-ready.
red team sidhistory, gpo cleanup, ntlm powershell, active directory audit
Maps orphaned T1/T2 accounts and finds AD inconsistencies quickly.
Parses EventID 4624/4625 for user session tracking & forensic auditing.
Resets stale replication states & triggers SYSVOL refresh (For Domain Controllers only) .
Detects and removes legacy SIDHistory entries to harden migration hygiene (To use very carefully, it has a serious impact on the trust) .
Detects privilege boundary violations by analyzing T0, T1, and T2 account memberships. Flags risky delegation or lateral access vectors.
Audits Group Policy Objects for misconfigurations, excessive permissions, and inheritance vulnerabilities that expose the domain.
Scans for misconfigured cross-domain trust paths and lateral movement opportunities via SIDHistory, adminSDHolder, and inter-forest ACLs.
RootDC.io thrives thanks to contributors who push the boundaries of AD defense and attack simulation.
If you’ve built a script that deserves visibility — detection, cleanup, audit, or exploitation — we want it on board.
📬 Submit your tools or scripts on GitHub:
🔗 [github.com/KuroStrike](https://github.com/KuroStrike)
Together we build stronger domains.