A security automation tool to detect misconfigurations in an active directory by analyzing data from Bloodhound
The config file "config.json" contains a two list of all connections between AD-Objects. Each list is for a specific direction (T1 -> T0 or T0 -> T1) If the value is set to true the connection will be marked as misconfiguration
Example:
A User from Tier1 should not have admin permissions for a Tier0 object
[...]
"IntoT0": {
"AdminTo": true,
[...]
A User from Tier0 is allowed to have admin permissions for a Tier1 object
[...]
"IntoT1": {
"AdminTo": false,
[...]
Download the latest release for your platform from Github here or build it on your own with
go build .