CrackMapExec

用于测试网络的瑞士军刀。「A swiss army knife for pentesting networks」

Github星跟踪图

Supported Python versions Twitter Twitter

CrackMapExec

This project was initially created in 2015 by @byt3bl33d3r, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️

You are on the latest up-to-date repository of the project CrackMapExec ! 🎉

  • 🚧 If you want to report a problem, open un Issue
  • 🔀 If you want to contribute, open a Pull Request
  • 💬 If you want to discuss, open a Discussion

Official Discord Channel

If you don't have a Github account, you can ask your question on Discord

Porchetta Industries

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation instructions on the official wiki

Code Contributors

Awesome code contributors of CME:





To do

  • 0wn everything

主要指标

概览
名称与所有者byt3bl33d3r/CrackMapExec
主编程语言Python
编程语言Python (语言数: 6)
平台
许可证BSD 2-Clause "Simplified" License
所有者活动
创建于2015-08-14 14:11:55
推送于2023-12-06 17:09:42
最后一次提交2023-12-06 10:09:41
发布数29
最新版本名称v5.4.0 (发布于 )
第一版名称v1.0.0 (发布于 )
用户参与
星数8.8k
关注者数307
派生数1.7k
提交数2.4k
已启用问题?
问题数558
打开的问题数57
拉请求数135
打开的拉请求数10
关闭的拉请求数96
项目设置
已启用Wiki?
已存档?
是复刻?
已锁定?
是镜像?
是私有?