fkad is a custom offensive helper kit designed for exegol containers. It automates common and mundane enumeration tasks, executes sanity checks and prepares artifacts for follow-up exploiting.
wget https://raw.githubusercontent.com/fkxdr/fkad/refs/heads/main/fkad.sh
chmod +x fkad.sh
./fkad.sh -u <user> -p '<password>' -d <dc-ip/domain.com>
Example:
./fkad.sh -u pentest1 -p 'Pentestpassword123' -d domain.com
./fkad.sh -u pentest1 -p 'Pentestpassword123' -d 10.10.2.13 -scope scope.txt
./fkad.sh -u pentest1 -p 'Pentestpassword123' -d domain.com -fastNote
The -fast flag limits extensive bloodhound checks in AD environments with many stale or dead objects, while the -scope flag allows the usage of a scoping file.txt with additional CIDR ranges (one per line) to extend network scans beyond the primary subnet.
For most assessments it makes sense to follow up enumeration on a provided device.
wget https://raw.githubusercontent.com/fkxdr/fkad/refs/heads/main/fkad.ps1
powershell -ExecutionPolicy Bypass -File fkad.ps1
Most likely these should be run across the network as well.
- Nessus
- Responder
This tool is for authorized security testing, research, and defensive validation only. Do not use it against systems you do not own or do not have explicit permission to test. The author is not responsible for misuse.