Update README.md

main
mpgn 2023-09-01 11:29:03 +02:00 committed by GitHub
parent 60f1e12a83
commit 3e6bd9f4ed
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 9 additions and 26 deletions

View File

@ -1,6 +1,12 @@
![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
This project was initially created in 2016 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️
You are on the latest up-to-date repository of the project CrackMapExec ! 🎉
- 🚧 If you want to report a problem, open un [Issue](https://github.com/mpgn/CrackMapExec/issues)
- 🔀 If you want to contribute, open a [Pull Request](https://github.com/mpgn/CrackMapExec/pulls)
- 💬 If you want to discuss, open a [Discussion](https://github.com/mpgn/CrackMapExec/discussions)
# CrackMapExec
@ -8,29 +14,6 @@
<img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
</p>
## In partnership with
<p float="left">
<a href="https://www.kali.org/">
<img src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png" width="300" align="left"/>
</a>
<a href="https://focal-point.com/services/penetration-testing/">
<img src="https://user-images.githubusercontent.com/5151193/182207768-f53d7e0e-5bd5-40cf-8734-dfa6a40a738e.png" width="300"/>
</a>
</p>
## :triangular_flag_on_post: Sponsors
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
## Official Discord Channel
Come hang out on Discord!
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
# Acknowledgments
**(These are the people who did the hard stuff)**
@ -46,10 +29,10 @@ Unintentional contributors:
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
# Documentation, Tutorials, Examples
See the project's [wiki](https://wiki.porchetta.industries/) for documentation and usage examples
See the project's [wiki](https://www.crackmapexec.wiki/) for documentation and usage examples
# Installation
Please see the installation on the [GitBook](https://wiki.porchetta.industries/getting-started/installation)
Please see the installation on the [GitBook](https://www.crackmapexec.wiki/getting-started/installation)
# Code Contributors