Doom is a Python tool developed to be used in Active Directory environments with Active Directory Certificate Services (ADCS) present. It identifies the ADCS server and enumerates all the templates and their properties, which can be useful to help identify security risks in the certificate templates.
Warning: This project is in beta and not public tested, expect bugs! (Open a issue if you have any)
Documentation is avaible in the Wiki page: https://deepwiki.com/000pp/doom
We recommend using pipx to install the project, so you can run it from anywhere and make things easier.
sudo apt install pipx git
pipx ensurepath
pipx install git+https://github.com/000pp/doom
brew install pipx
pipx ensurepath
pipx install git+https://github.com/000pp/doom
git clone https://github.com/000pp/doom.git
pipx install .
pipx reinstall doom
Doom was created to help security analysts identify vulnerabilities in certificate templates in an Active Directory environment. Recently, I've seen some posts and talks about false positives in some tools, so why not look at the template manually? Of course, I don't have any problem with these tools or their results; this project is not a war against them or a form of depreciation. It's simply a new way to look at certificate templates.



- Improve TUI
- Retrieve more properies from the certificate templates
- Enumerate Groups/Users allowed to enroll certificates
- Copy more Certipy code
This tool is totally based on Certipy's project. A big shout-out to ly4k and all the maintainers!