LSE toolsLSE toolsRID_ENUM (273)RID_ENUM (273)

Tool and Usage

Project details
LicenseCustom license
Programming languagePython
AuthorDavid Kennedy
Latest release1.7 []

Project health

This score is calculated by different factors, like project age, last release date, etc.

Why this tool?

The RID_ENUM utility (or Rid Enum) performs a cycling attack to attempt retrieving all users from a Windows domain controller. It focuses on retrieving identities from the domain admins group. The attack will work to versions, with Windows 2003 being the latest. This was to ensure compatibility with previous versions of Windows. Windows 2008 and later will not allow this type of enumeration to happen.

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:


  • + The source code of this software is available

Author and Maintainers

RID_ENUM is under development by David Kennedy.



Several dependencies are required to use RID_ENUM.

  • pexpect

RID_ENUM alternatives

Similar tools to RID_ENUM:



LinEnum can be used during penetration tests to perform scripted local Linux enumeration and check for privilege escalations.



Massh-enum is a user enumeration tool for OpenSSH with the goal to find valid usernames. Read how it works in this review.

All RID_ENUM alternatives

This tool page was updated at . Found an improvement? Help the community by submitting an update.

Related tool information


This tool is categorized as a system enumeration tool.