Skip to content
p3xsouger edited this page Jul 2, 2024 · 1 revision

Welcome to the BlackMarlinExec wiki!

INTRODUCTION

BlackMarlinExec uses graph and analysis theory to reveal the hidden and unintended relationships within an Active Directory or Active Environment. Security can use BlackMarlinExec to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. It also has it's own attack path management that continuously maps and quantifies Active Directory attack paths. CS can see thousand, even millions of attack paths within your existing architecture.

To get the dataset check out the instructions in the dataset folder.

( THIS TOOL IS FOR LEGAL PURPOSES ONLY! )

There are already several active directory tools available, however, none does either support more than one protocol to find an attack path or support parallelized connections.

(*) Note: BlackMarlinExec uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment. This program is free software: you can redistribute it and/or modify it under the terms of the GNU as published by the Free Software Foundation, either version of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GPL License for more details.

Clone this wiki locally