CrackMapExec

用于测试网络的瑞士军刀。「A swiss army knife for pentesting networks」

Github星跟蹤圖

Supported Python versions Twitter Twitter

CrackMapExec

This project was initially created in 2015 by @byt3bl33d3r, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️

You are on the latest up-to-date repository of the project CrackMapExec ! 🎉

  • 🚧 If you want to report a problem, open un Issue
  • 🔀 If you want to contribute, open a Pull Request
  • 💬 If you want to discuss, open a Discussion

Official Discord Channel

If you don't have a Github account, you can ask your question on Discord

Porchetta Industries

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation instructions on the official wiki

Code Contributors

Awesome code contributors of CME:





To do

  • 0wn everything

主要指標

概覽
名稱與所有者byt3bl33d3r/CrackMapExec
主編程語言Python
編程語言Python (語言數: 6)
平台
許可證BSD 2-Clause "Simplified" License
所有者活动
創建於2015-08-14 14:11:55
推送於2023-12-06 17:09:42
最后一次提交2023-12-06 10:09:41
發布數29
最新版本名稱v5.4.0 (發布於 )
第一版名稱v1.0.0 (發布於 )
用户参与
星數8.8k
關注者數307
派生數1.7k
提交數2.4k
已啟用問題?
問題數558
打開的問題數57
拉請求數135
打開的拉請求數10
關閉的拉請求數96
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?