Provide comprehensive techniques for attacking Microsoft Active Directory environments. Covers reconnaissance, credential harvesting, Kerberos attacks, lateral movement, privilege escalation, and domain dominance for red team operations and penetration testing.
62
73%
Does it follow best practices?
Impact
—
No eval scenarios have been run
Critical
Do not install without reviewing
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/active-directory-attacks/SKILL.mdQuality
Discovery
82%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong description with excellent specificity and domain-relevant trigger terms that clearly define its niche in Active Directory offensive security. Its main weakness is the absence of an explicit 'Use when...' clause, which would help Claude know exactly when to select this skill over others. Adding trigger guidance would elevate this from good to excellent.
Suggestions
Add an explicit 'Use when...' clause, e.g., 'Use when the user asks about attacking Active Directory, AD exploitation, red teaming Windows domains, or Kerberos-based attacks.'
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: reconnaissance, credential harvesting, Kerberos attacks, lateral movement, privilege escalation, and domain dominance. These are well-defined, specific categories of activity. | 3 / 3 |
Completeness | Clearly answers 'what does this do' with the list of attack techniques, but lacks an explicit 'Use when...' clause or equivalent trigger guidance. The context of red team/pentesting is mentioned but not framed as selection criteria. | 2 / 3 |
Trigger Term Quality | Includes strong natural keywords users would say: 'Active Directory', 'Kerberos attacks', 'lateral movement', 'privilege escalation', 'credential harvesting', 'red team', 'penetration testing', 'domain dominance', 'reconnaissance'. These cover the terms a security professional would naturally use. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive with a clear niche: Microsoft Active Directory attack techniques for red team operations. The combination of AD-specific terminology (Kerberos, domain dominance) and offensive security context makes it very unlikely to conflict with other skills. | 3 / 3 |
Total | 11 / 12 Passed |
Implementation
64%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a comprehensive, highly actionable AD attack reference with concrete, executable commands for every technique covered. Its main weaknesses are the length and lack of validation checkpoints between attack steps — for destructive operations like ZeroLogon or DCSync, explicit verification steps would improve reliability. The content would benefit from splitting into sub-files by attack category, with the main SKILL.md serving as a concise overview with navigation.
Suggestions
Add explicit validation/verification steps after key attacks (e.g., 'Verify ticket works: klist' after golden ticket creation, 'Confirm access: whoami /all' after pass-the-hash)
Split the monolithic content into sub-files by attack category (e.g., kerberos-attacks.md, ntlm-relay.md, adcs-attacks.md, cve-exploits.md) and keep SKILL.md as a concise overview with navigation links
Remove the boilerplate 'When to Use' section and trim the Purpose/Inputs/Outputs sections which add little actionable value
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is mostly efficient with concrete commands rather than explanations, but includes some unnecessary sections like the 'Purpose' restating the description, the 'Inputs/Prerequisites' and 'Outputs/Deliverables' sections that add little value, and the 'When to Use' boilerplate at the end. The Quick Reference table partially duplicates commands already shown above. | 2 / 3 |
Actionability | Nearly every technique includes fully executable, copy-paste-ready commands with specific tool invocations, flags, and arguments. Multiple tool alternatives are provided for each attack type, and the examples section shows complete end-to-end attack chains with numbered steps. | 3 / 3 |
Workflow Clarity | The core workflow has numbered steps for initial phases (clock sync, recon, enumeration), and the examples show sequenced attack chains. However, validation checkpoints are largely missing — there's no explicit 'verify this worked before proceeding' between steps, and the constraints section is more of a checklist than integrated feedback loops. The ZeroLogon section notably includes a restore step, but most attack sequences lack verification steps. | 2 / 3 |
Progressive Disclosure | The content references 'references/advanced-attacks.md' for advanced techniques, which is good progressive disclosure, but no bundle files exist to support this reference. The main file itself is quite long (~300 lines) with substantial inline detail that could be split into separate reference files for different attack categories (Kerberos, NTLM relay, AD CS, CVEs). | 2 / 3 |
Total | 9 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 10 / 11 Passed | |
45bad85
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.