CrackMapExec

用于测试网络的瑞士军刀。「A swiss army knife for pentesting networks」

Github stars Tracking Chart

Supported Python versions Twitter Twitter

CrackMapExec

This project was initially created in 2015 by @byt3bl33d3r, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️

You are on the latest up-to-date repository of the project CrackMapExec ! 🎉

  • 🚧 If you want to report a problem, open un Issue
  • 🔀 If you want to contribute, open a Pull Request
  • 💬 If you want to discuss, open a Discussion

Official Discord Channel

If you don't have a Github account, you can ask your question on Discord

Porchetta Industries

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation instructions on the official wiki

Code Contributors

Awesome code contributors of CME:





To do

  • 0wn everything

Main metrics

Overview
Name With Ownerbyt3bl33d3r/CrackMapExec
Primary LanguagePython
Program languagePython (Language Count: 6)
Platform
License:BSD 2-Clause "Simplified" License
所有者活动
Created At2015-08-14 14:11:55
Pushed At2023-12-06 17:09:42
Last Commit At2023-12-06 10:09:41
Release Count29
Last Release Namev5.4.0 (Posted on )
First Release Namev1.0.0 (Posted on )
用户参与
Stargazers Count8.8k
Watchers Count307
Fork Count1.7k
Commits Count2.4k
Has Issues Enabled
Issues Count558
Issue Open Count57
Pull Requests Count135
Pull Requests Open Count10
Pull Requests Close Count96
项目设置
Has Wiki Enabled
Is Archived
Is Fork
Is Locked
Is Mirror
Is Private