5d4f3b5606
I'll add technical links to the blog post explaining token manipulation internals as well as the source code of the original binary when the blog post will be released (should be on monday) |
||
---|---|---|
.github | ||
cme | ||
.dockerignore | ||
.gitignore | ||
.gitlab-ci.yml | ||
.gitmodules | ||
Dockerfile | ||
LICENSE | ||
Makefile | ||
README.md | ||
build_collector.py | ||
crackmapexec.spec | ||
flake.lock | ||
flake.nix | ||
poetry.lock | ||
pyproject.toml | ||
requirements.txt | ||
shell.nix |
README.md
🚩 This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
CrackMapExec
In partnership with
🚩 Sponsors
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
Official Discord Channel
Come hang out on Discord!
Acknowledgments
(These are the people who did the hard stuff)
This project was originally inspired by:
Unintentional contributors:
- The Empire project
- @T-S-A's smbspider script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project
Documentation, Tutorials, Examples
See the project's wiki for documentation and usage examples
Installation
Please see the installation on the GitBook
To do
0wn everything