commit
2bef9a2eaa
|
@ -1,3 +0,0 @@
|
|||
# These are supported funding model platforms
|
||||
|
||||
custom: https://porchetta.industries/
|
|
@ -1,16 +0,0 @@
|
|||
## Steps to reproduce
|
||||
|
||||
1. ...
|
||||
2. ...
|
||||
|
||||
## Command string used
|
||||
|
||||
## CME verbose output (using the --verbose flag)
|
||||
|
||||
## CME Version (cme --version)
|
||||
|
||||
## OS
|
||||
|
||||
## Target OS
|
||||
|
||||
## Detailed issue explanation
|
|
@ -1,17 +0,0 @@
|
|||
stages :
|
||||
- build
|
||||
|
||||
build_linux :
|
||||
image: python:3.8-slim
|
||||
stage: build
|
||||
before_script:
|
||||
- apt update
|
||||
- apt install -y git
|
||||
- git submodule update --init --recursive
|
||||
- pip install shiv
|
||||
script:
|
||||
- python build_collector.py
|
||||
artifacts:
|
||||
untracked: false
|
||||
expire_in: 30 days
|
||||
paths: ["./bin/cme", "./bin/cmedb"]
|
27
README.md
27
README.md
|
@ -1,33 +1,22 @@
|
|||
![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
|
||||
|
||||
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
|
||||
|
||||
# CrackMapExec
|
||||
|
||||
<p align="center">
|
||||
<img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
|
||||
</p>
|
||||
|
||||
This project was initially created in 2015 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️
|
||||
|
||||
## In partnership with
|
||||
You are on the **latest up-to-date** repository of the project CrackMapExec ! 🎉
|
||||
|
||||
<p float="left">
|
||||
<a href="https://www.kali.org/">
|
||||
<img src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png" width="300" align="left"/>
|
||||
</a>
|
||||
|
||||
<a href="https://focal-point.com/services/penetration-testing/">
|
||||
<img src="https://user-images.githubusercontent.com/5151193/182207768-f53d7e0e-5bd5-40cf-8734-dfa6a40a738e.png" width="300"/>
|
||||
</a>
|
||||
</p>
|
||||
|
||||
## :triangular_flag_on_post: Sponsors
|
||||
|
||||
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
|
||||
- 🚧 If you want to report a problem, open un [Issue](https://github.com/mpgn/CrackMapExec/issues)
|
||||
- 🔀 If you want to contribute, open a [Pull Request](https://github.com/mpgn/CrackMapExec/pulls)
|
||||
- 💬 If you want to discuss, open a [Discussion](https://github.com/mpgn/CrackMapExec/discussions)
|
||||
|
||||
## Official Discord Channel
|
||||
|
||||
Come hang out on Discord!
|
||||
If you don't have a Github account, you can ask your question on Discord
|
||||
|
||||
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
|
||||
|
||||
|
@ -46,10 +35,10 @@ Unintentional contributors:
|
|||
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
|
||||
|
||||
# Documentation, Tutorials, Examples
|
||||
See the project's [wiki](https://wiki.porchetta.industries/) for documentation and usage examples
|
||||
See the project's [wiki](https://www.crackmapexec.wiki/) for documentation and usage examples
|
||||
|
||||
# Installation
|
||||
Please see the installation on the [GitBook](https://wiki.porchetta.industries/getting-started/installation)
|
||||
Please see the installation instructions on the [official wiki](https://www.crackmapexec.wiki/getting-started/installation)
|
||||
|
||||
# Code Contributors
|
||||
|
||||
|
|
|
@ -26,11 +26,8 @@ def gen_cli_args():
|
|||
A swiss army knife for pentesting networks
|
||||
Forged by @byt3bl33d3r and @mpgn_x64 using the powah of dank memes
|
||||
|
||||
{colored("Exclusive release for Porchetta Industries users", "magenta")}
|
||||
{colored("https://porchetta.industries/", "magenta")}
|
||||
|
||||
{highlight('Version', 'red')} : {highlight(VERSION)}
|
||||
{highlight('Codename', 'red')}: {highlight(CODENAME)}
|
||||
{highlight('Version', 'red')} : {highlight(VERSION)}
|
||||
{highlight('Codename', 'red')}: {highlight(CODENAME)}
|
||||
""",
|
||||
formatter_class=RawTextHelpFormatter,
|
||||
)
|
||||
|
|
Loading…
Reference in New Issue