- Home
- Security Operations
- Cyber Range Training
- Vulnerable-AD
Vulnerable-AD
Create a vulnerable active directory for testing various Active Directory attacks.

Vulnerable-AD
Create a vulnerable active directory for testing various Active Directory attacks.

Founder & Fractional CISO
Not sure if Vulnerable-AD is right for your team?
Book a 60-minute strategy call with Nikoloz. You will get a clear roadmap to evaluate products and make a decision.
→Align tool selection with your actual business goals
→Right-sized for your stage (not enterprise bloat)
→Not 47 options, exactly 3 that fit your needs
→Stop researching, start deciding
→Questions that reveal if the tool actually works
→Most companies never ask these
→The costs vendors hide in contracts
→How to uncover real Total Cost of Ownerhship before signing
Vulnerable-AD Description
Create a vulnerable active directory that allows you to test most Active Directory attacks in a local lab. Main Features: - Randomize Attacks - Full Coverage of the mentioned attacks - Some attacks require a client workstation - Supported Attacks: Abusing ACLs/ACEs, Kerberoasting, AS-REP Roasting, Abuse DnsAdmins, Password in Object Description, User Objects With Default password (Changeme123!), Password Spraying, DCSync, Silver Ticket, Golden Ticket, Pass-the-Hash, Pass-the-Ticket, SMB Signing Disabled. Example: If you haven't installed Active Directory yet, you can try the provided script. If you already have Active Directory installed, just run the script.
Vulnerable-AD FAQ
Common questions about Vulnerable-AD including features, pricing, alternatives, and user reviews.
Vulnerable-AD is Create a vulnerable active directory for testing various Active Directory attacks.. It is a Security Operations solution designed to help security teams with Red Team, Security Testing, Penetration Testing.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure