Merge pull request #136 from mpgn/ccleanup

Cleanup
main
mpgn 2023-09-03 18:44:36 +02:00 committed by GitHub
commit 2bef9a2eaa
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 10 additions and 60 deletions

3
.github/FUNDING.yml vendored
View File

@ -1,3 +0,0 @@
# These are supported funding model platforms
custom: https://porchetta.industries/

View File

@ -1,16 +0,0 @@
## Steps to reproduce
1. ...
2. ...
## Command string used
## CME verbose output (using the --verbose flag)
## CME Version (cme --version)
## OS
## Target OS
## Detailed issue explanation

View File

@ -1,17 +0,0 @@
stages :
- build
build_linux :
image: python:3.8-slim
stage: build
before_script:
- apt update
- apt install -y git
- git submodule update --init --recursive
- pip install shiv
script:
- python build_collector.py
artifacts:
untracked: false
expire_in: 30 days
paths: ["./bin/cme", "./bin/cmedb"]

View File

@ -1,33 +1,22 @@
![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
# CrackMapExec
<p align="center">
<img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
</p>
This project was initially created in 2015 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️
## In partnership with
You are on the **latest up-to-date** repository of the project CrackMapExec ! 🎉
<p float="left">
<a href="https://www.kali.org/">
<img src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png" width="300" align="left"/>
</a>
<a href="https://focal-point.com/services/penetration-testing/">
<img src="https://user-images.githubusercontent.com/5151193/182207768-f53d7e0e-5bd5-40cf-8734-dfa6a40a738e.png" width="300"/>
</a>
</p>
## :triangular_flag_on_post: Sponsors
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
- 🚧 If you want to report a problem, open un [Issue](https://github.com/mpgn/CrackMapExec/issues)
- 🔀 If you want to contribute, open a [Pull Request](https://github.com/mpgn/CrackMapExec/pulls)
- 💬 If you want to discuss, open a [Discussion](https://github.com/mpgn/CrackMapExec/discussions)
## Official Discord Channel
Come hang out on Discord!
If you don't have a Github account, you can ask your question on Discord
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
@ -46,10 +35,10 @@ Unintentional contributors:
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
# Documentation, Tutorials, Examples
See the project's [wiki](https://wiki.porchetta.industries/) for documentation and usage examples
See the project's [wiki](https://www.crackmapexec.wiki/) for documentation and usage examples
# Installation
Please see the installation on the [GitBook](https://wiki.porchetta.industries/getting-started/installation)
Please see the installation instructions on the [official wiki](https://www.crackmapexec.wiki/getting-started/installation)
# Code Contributors

View File

@ -26,11 +26,8 @@ def gen_cli_args():
A swiss army knife for pentesting networks
Forged by @byt3bl33d3r and @mpgn_x64 using the powah of dank memes
{colored("Exclusive release for Porchetta Industries users", "magenta")}
{colored("https://porchetta.industries/", "magenta")}
{highlight('Version', 'red')} : {highlight(VERSION)}
{highlight('Codename', 'red')}: {highlight(CODENAME)}
{highlight('Version', 'red')} : {highlight(VERSION)}
{highlight('Codename', 'red')}: {highlight(CODENAME)}
""",
formatter_class=RawTextHelpFormatter,
)