From 60f1e12a83bc925ebd9546aaff3d4d32e4779663 Mon Sep 17 00:00:00 2001 From: mpgn Date: Fri, 1 Sep 2023 11:26:14 +0200 Subject: [PATCH 1/7] Delete .gitlab-ci.yml --- .gitlab-ci.yml | 17 ----------------- 1 file changed, 17 deletions(-) delete mode 100644 .gitlab-ci.yml diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml deleted file mode 100644 index b5d90505..00000000 --- a/.gitlab-ci.yml +++ /dev/null @@ -1,17 +0,0 @@ -stages : - - build - -build_linux : - image: python:3.8-slim - stage: build - before_script: - - apt update - - apt install -y git - - git submodule update --init --recursive - - pip install shiv - script: - - python build_collector.py - artifacts: - untracked: false - expire_in: 30 days - paths: ["./bin/cme", "./bin/cmedb"] From 3e6bd9f4edeacce15376d81b1456eb8b8f3bfed9 Mon Sep 17 00:00:00 2001 From: mpgn Date: Fri, 1 Sep 2023 11:29:03 +0200 Subject: [PATCH 2/7] Update README.md --- README.md | 35 +++++++++-------------------------- 1 file changed, 9 insertions(+), 26 deletions(-) diff --git a/README.md b/README.md index 93df6928..6471bfee 100755 --- a/README.md +++ b/README.md @@ -1,6 +1,12 @@ ![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64) -:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/ +This project was initially created in 2016 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️ + +You are on the latest up-to-date repository of the project CrackMapExec ! 🎉 + +- 🚧 If you want to report a problem, open un [Issue](https://github.com/mpgn/CrackMapExec/issues) +- 🔀 If you want to contribute, open a [Pull Request](https://github.com/mpgn/CrackMapExec/pulls) +- 💬 If you want to discuss, open a [Discussion](https://github.com/mpgn/CrackMapExec/discussions) # CrackMapExec @@ -8,29 +14,6 @@ cme

- -## In partnership with - -

- - - - - - - -

- -## :triangular_flag_on_post: Sponsors - -If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/ - -## Official Discord Channel - -Come hang out on Discord! - -[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy) - # Acknowledgments **(These are the people who did the hard stuff)** @@ -46,10 +29,10 @@ Unintentional contributors: - @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project # Documentation, Tutorials, Examples -See the project's [wiki](https://wiki.porchetta.industries/) for documentation and usage examples +See the project's [wiki](https://www.crackmapexec.wiki/) for documentation and usage examples # Installation -Please see the installation on the [GitBook](https://wiki.porchetta.industries/getting-started/installation) +Please see the installation on the [GitBook](https://www.crackmapexec.wiki/getting-started/installation) # Code Contributors From 94d77e584f1b6e9fb6587ada5fb8c4c761943949 Mon Sep 17 00:00:00 2001 From: mpgn Date: Fri, 1 Sep 2023 11:30:02 +0200 Subject: [PATCH 3/7] Update cli.py --- cme/cli.py | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/cme/cli.py b/cme/cli.py index 007b8e1b..ca3b73b6 100755 --- a/cme/cli.py +++ b/cme/cli.py @@ -26,11 +26,8 @@ def gen_cli_args(): A swiss army knife for pentesting networks Forged by @byt3bl33d3r and @mpgn_x64 using the powah of dank memes - {colored("Exclusive release for Porchetta Industries users", "magenta")} - {colored("https://porchetta.industries/", "magenta")} - - {highlight('Version', 'red')} : {highlight(VERSION)} - {highlight('Codename', 'red')}: {highlight(CODENAME)} + {highlight('Version', 'red')} : {highlight(VERSION)} + {highlight('Codename', 'red')}: {highlight(CODENAME)} """, formatter_class=RawTextHelpFormatter, ) From bf4dadcfb2225c2b18311e520e54f678815207d1 Mon Sep 17 00:00:00 2001 From: Alex <61382599+NeffIsBack@users.noreply.github.com> Date: Fri, 1 Sep 2023 12:12:16 +0200 Subject: [PATCH 4/7] Remove funding yaml, align version text in cli file, README formating --- .github/FUNDING.yml | 3 --- README.md | 11 ++++++----- cme/cli.py | 4 ++-- 3 files changed, 8 insertions(+), 10 deletions(-) delete mode 100644 .github/FUNDING.yml diff --git a/.github/FUNDING.yml b/.github/FUNDING.yml deleted file mode 100644 index ab3f584c..00000000 --- a/.github/FUNDING.yml +++ /dev/null @@ -1,3 +0,0 @@ -# These are supported funding model platforms - -custom: https://porchetta.industries/ diff --git a/README.md b/README.md index 6471bfee..29cde934 100755 --- a/README.md +++ b/README.md @@ -1,5 +1,11 @@ ![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64) +# CrackMapExec + +

+ cme +

+ This project was initially created in 2016 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️ You are on the latest up-to-date repository of the project CrackMapExec ! 🎉 @@ -8,11 +14,6 @@ You are on the latest up-to-date repository of the project CrackMapExec ! 🎉 - 🔀 If you want to contribute, open a [Pull Request](https://github.com/mpgn/CrackMapExec/pulls) - 💬 If you want to discuss, open a [Discussion](https://github.com/mpgn/CrackMapExec/discussions) -# CrackMapExec - -

- cme -

# Acknowledgments **(These are the people who did the hard stuff)** diff --git a/cme/cli.py b/cme/cli.py index ca3b73b6..dfe6dee3 100755 --- a/cme/cli.py +++ b/cme/cli.py @@ -26,8 +26,8 @@ def gen_cli_args(): A swiss army knife for pentesting networks Forged by @byt3bl33d3r and @mpgn_x64 using the powah of dank memes - {highlight('Version', 'red')} : {highlight(VERSION)} - {highlight('Codename', 'red')}: {highlight(CODENAME)} + {highlight('Version', 'red')} : {highlight(VERSION)} + {highlight('Codename', 'red')}: {highlight(CODENAME)} """, formatter_class=RawTextHelpFormatter, ) From f354559cb5680876b86310fef827fa5555986093 Mon Sep 17 00:00:00 2001 From: Alex <61382599+NeffIsBack@users.noreply.github.com> Date: Fri, 1 Sep 2023 12:12:29 +0200 Subject: [PATCH 5/7] Delete old issue template --- .github/ISSUE_TEMPLATE.md | 16 ---------------- 1 file changed, 16 deletions(-) delete mode 100755 .github/ISSUE_TEMPLATE.md diff --git a/.github/ISSUE_TEMPLATE.md b/.github/ISSUE_TEMPLATE.md deleted file mode 100755 index d31e34eb..00000000 --- a/.github/ISSUE_TEMPLATE.md +++ /dev/null @@ -1,16 +0,0 @@ -## Steps to reproduce - -1. ... -2. ... - -## Command string used - -## CME verbose output (using the --verbose flag) - -## CME Version (cme --version) - -## OS - -## Target OS - -## Detailed issue explanation From bb88fa59c521987b12e734cc64aa19b7035cbb13 Mon Sep 17 00:00:00 2001 From: mpgn Date: Sun, 3 Sep 2023 13:51:28 +0200 Subject: [PATCH 6/7] Update README.md --- README.md | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 29cde934..24729cfe 100755 --- a/README.md +++ b/README.md @@ -6,14 +6,19 @@ cme

-This project was initially created in 2016 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️ +This project was initially created in 2015 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️ -You are on the latest up-to-date repository of the project CrackMapExec ! 🎉 +You are on the **latest up-to-date** repository of the project CrackMapExec ! 🎉 - 🚧 If you want to report a problem, open un [Issue](https://github.com/mpgn/CrackMapExec/issues) - 🔀 If you want to contribute, open a [Pull Request](https://github.com/mpgn/CrackMapExec/pulls) - 💬 If you want to discuss, open a [Discussion](https://github.com/mpgn/CrackMapExec/discussions) +## Official Discord Channel + +If you don't have a Github account, you can ask your question on Discord + +[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy) # Acknowledgments **(These are the people who did the hard stuff)** From 007d4f4f6ce0d91a17d167addab2c6a74a8e0bb0 Mon Sep 17 00:00:00 2001 From: mpgn Date: Sun, 3 Sep 2023 14:03:55 +0200 Subject: [PATCH 7/7] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 24729cfe..8bfe0585 100755 --- a/README.md +++ b/README.md @@ -38,7 +38,7 @@ Unintentional contributors: See the project's [wiki](https://www.crackmapexec.wiki/) for documentation and usage examples # Installation -Please see the installation on the [GitBook](https://www.crackmapexec.wiki/getting-started/installation) +Please see the installation instructions on the [official wiki](https://www.crackmapexec.wiki/getting-started/installation) # Code Contributors