Update README.md
parent
60f1e12a83
commit
3e6bd9f4ed
35
README.md
35
README.md
|
@ -1,6 +1,12 @@
|
|||
![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
|
||||
|
||||
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
|
||||
This project was initially created in 2016 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️
|
||||
|
||||
You are on the latest up-to-date repository of the project CrackMapExec ! 🎉
|
||||
|
||||
- 🚧 If you want to report a problem, open un [Issue](https://github.com/mpgn/CrackMapExec/issues)
|
||||
- 🔀 If you want to contribute, open a [Pull Request](https://github.com/mpgn/CrackMapExec/pulls)
|
||||
- 💬 If you want to discuss, open a [Discussion](https://github.com/mpgn/CrackMapExec/discussions)
|
||||
|
||||
# CrackMapExec
|
||||
|
||||
|
@ -8,29 +14,6 @@
|
|||
<img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
|
||||
</p>
|
||||
|
||||
|
||||
## In partnership with
|
||||
|
||||
<p float="left">
|
||||
<a href="https://www.kali.org/">
|
||||
<img src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png" width="300" align="left"/>
|
||||
</a>
|
||||
|
||||
<a href="https://focal-point.com/services/penetration-testing/">
|
||||
<img src="https://user-images.githubusercontent.com/5151193/182207768-f53d7e0e-5bd5-40cf-8734-dfa6a40a738e.png" width="300"/>
|
||||
</a>
|
||||
</p>
|
||||
|
||||
## :triangular_flag_on_post: Sponsors
|
||||
|
||||
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
|
||||
|
||||
## Official Discord Channel
|
||||
|
||||
Come hang out on Discord!
|
||||
|
||||
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
|
||||
|
||||
# Acknowledgments
|
||||
**(These are the people who did the hard stuff)**
|
||||
|
||||
|
@ -46,10 +29,10 @@ Unintentional contributors:
|
|||
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
|
||||
|
||||
# Documentation, Tutorials, Examples
|
||||
See the project's [wiki](https://wiki.porchetta.industries/) for documentation and usage examples
|
||||
See the project's [wiki](https://www.crackmapexec.wiki/) for documentation and usage examples
|
||||
|
||||
# Installation
|
||||
Please see the installation on the [GitBook](https://wiki.porchetta.industries/getting-started/installation)
|
||||
Please see the installation on the [GitBook](https://www.crackmapexec.wiki/getting-started/installation)
|
||||
|
||||
# Code Contributors
|
||||
|
||||
|
|
Loading…
Reference in New Issue