8c4e20d5d8 | ||
---|---|---|
.github | ||
cme | ||
tests | ||
.dockerignore | ||
.gitignore | ||
.gitmodules | ||
Dockerfile | ||
LICENSE | ||
Makefile | ||
README.md | ||
build_collector.py | ||
crackmapexec.spec | ||
flake.lock | ||
flake.nix | ||
poetry.lock | ||
pyproject.toml | ||
shell.nix |
README.md
🚩 This is the open source repository of CrackMapExec maintained by a community of passionate people
CrackMapExec
This project was initially created in 2015 by @byt3bl33d3r. In 2019 @mpgn_x64 started maintaining the project. Five years and a lot of additions later, he retired from maintaining the project. Like many other contributer we (NeffIsBack, Marshall-Hallenbeck and zblurx) started working on new features, bugfixes and helped maintaining CME. With the end of mpgn's maintainer role, we decided to maintain the project together as an full open source project.
You are on the latest up-to-date repository of the project CrackMapExec ! 🎉
- 🚧 If you want to report a problem, open un Issue
- 🔀 If you want to contribute, open a Pull Request
- 💬 If you want to discuss, open a Discussion
Acknowledgments
(These are the people who did the hard stuff)
This project was originally inspired by:
Unintentional contributors:
- The Empire project
- @T-S-A's smbspider script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project
Documentation, Tutorials, Examples
See the project's wiki for documentation and usage examples
Installation
Please see the installation instructions on the official wiki
Code Contributors
Awesome code contributors of CME:
To do
0wn everything