A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB directly.
Warning
Use only in environments where you have explicit authorization. Unauthorized use may be illegal.
- 📋 Request and Export certificates remotely via DCOM/SMB
- 📋 Add Subject Alternative Names (UPN/DNS) for ESC1 exploitation
- 📋 Retrieve pending certificates with CA Manager Approval by request ID
- 💥 ESC1: Request certificates with arbitrary UPNs to impersonate other users
- 💥 ESC6: Abuse any template when EDITF_ATTRIBUTESUBJECTALTNAME2 is set
- 💥 Persistence: Create long-lived certificates for backdoor access
# Clone or download the tool
git clone https://github.com/7hePr0fess0r/ADCSDevilCOM
cd ADCSDevilCOM
# Build (For testing I used .NET 9 SDK)
dotnet build
# Publish (optional)
dotnet publish -c Release -r win-x64 --self-contained true -p:PublishSingleFile=true -p:IncludeNativeLibrariesForSelfExtract=trueADCSDevilCOM.exe -target dc01.corp.local -ca DC01-CA -template VulnerableTemplate [OPTIONS]See the Technical Details for how ADCSDevilCOM works.
See the Usecases for how ADCSDevilCOM can be used.