Analyze secretsdump output and hashcat potfiles to find shared passwords, weak credentials, and other issues in Active Directory. No dependencies.
Built from years of hands-on experience in enterprise penetration testing. Used in real-world assessments of Fortune 500 companies and critical infrastructure.
pip install tattletaleIt's a single Python file with no dependencies. Grab it and go:
curl -O https://raw.githubusercontent.com/coryavra/tattletale/master/tattletale.pyThe included Containerfile works with Apple Containers (macOS 26+) and Docker (OCI-compliant).
# Apple Containers (native to macOS)
container build -t tattletale .
container run --rm -v "$(pwd)/data:/mnt/shared" tattletale \
-d /mnt/shared/ntds.dit \
-p /mnt/shared/cracked.pot \
-o /mnt/shared/report
# Docker works too
docker build -t tattletale .
docker run --rm -v "$(pwd)/data:/mnt/shared" tattletale \
-d /mnt/shared/ntds.dit \
-p /mnt/shared/cracked.pot \
-o /mnt/shared/reporttattletale -d <file> -p <file> -b <zip> [options]
REQUIRED
-d, --dit <file> NTDS.DIT dump file from secretsdump
RECOMMENDED
-p, --pot <file> Hashcat potfile with cracked hashes
-b, --bloodhound <zip> SharpHound zip export for privileged group identification
OPTIONS
-t, --targets <files> Additional target lists (e.g. -t svc_accounts.txt)
-o, --output <dir> Export reports to directory
-r, --redact Hide passwords completely (************)
-R, --redact-partial Show first two chars only (Pa**********)
-h, --help Show this help message
-v, --version Show version number
SHOW (limit output to specific sections — shows all when omitted)
--show-stats Statistics and security warnings
--show-krbtgt krbtgt / Golden Ticket detection
--show-targets High value targets
--show-shared Shared target credentials
--show-cross-domain Cross-domain shared passwords
--show-analysis Password analysis and patterns
POLICY (check cracked passwords against requirements)
--policy-length <n> Minimum password length
--policy-complexity <n> Require n-of-4 character classes (1-4)
(uppercase, lowercase, digit, symbol)
# Full analysis — cracked hashes + BloodHound privileged group context
tattletale -d ntds.dit -p cracked.pot -b BloodHound.zip
# With additional target lists for accounts not in BloodHound
tattletale -d ntds.dit -p cracked.pot -b BloodHound.zip -t svc_accounts.txt
# Basic analysis (DIT only)
tattletale -d ntds.dit
# Target lists without BloodHound
tattletale -d ntds.dit -p cracked.pot -t domain_admins.txt local_admins.txt
# Redacted output for screenshotting
tattletale -d ntds.dit -p cracked.pot -r
# Check cracked passwords against policy (8 chars, 3-of-4 complexity)
tattletale -d ntds.dit -p cracked.pot --policy-length 8 --policy-complexity 3Overview of the dump: total accounts, cracking progress, hash types, and security warnings like empty passwords or legacy LM hashes.
Tracks accounts from target lists and BloodHound-identified privileged group members. Grouped by source with cracked passwords displayed inline.
Accounts that share the same password hash. Grouped by password with target and privileged accounts highlighted.
Detects identical NT hashes appearing across multiple domains. Highlights lateral movement risk in multi-domain environments.
Pattern analysis across all cracked passwords: length distribution, character composition, common patterns (seasons, years, keyboard walks), and most common passwords.
| File | Format | Example |
|---|---|---|
| DIT dump | secretsdump output | DOMAIN\user:1001:LM_HASH:NT_HASH::: |
| Potfile | hashcat potfile | NT_HASH:cleartext |
| Targets | one username per line | administrator |
| BloodHound | SharpHound zip export | 20240115_BloodHound.zip |
Standing on the shoulders of giants:
- secretsdump.py - extract hashes from NTDS.DIT
- hashcat - crack the hashes
- BloodHound - map Active Directory attack paths
MIT





