The Network Execution Tool
 
 
 
Go to file
byt3bl33d3r 8e6cc4e899 DB schema for the smb protocol is now final!
- added two more attributes to use in modules:opsec_safe and multiple_hosts

- renamed db function names

- Added the python_injector module and it's necessary files as a reminder
2016-12-20 00:23:40 -07:00
.github Initial commit for v4.0 2016-12-15 00:28:00 -07:00
cme DB schema for the smb protocol is now final! 2016-12-20 00:23:40 -07:00
.gitignore Initial commit for v4.0 2016-12-15 00:28:00 -07:00
.gitmodules Initial commit for v4.0 2016-12-15 00:28:00 -07:00
LICENSE Initial commit for v4.0 2016-12-15 00:28:00 -07:00
MANIFEST.in Initial commit for v4.0 2016-12-15 00:28:00 -07:00
Makefile Initial commit for v4.0 2016-12-15 00:28:00 -07:00
README.md Initial commit for v4.0 2016-12-15 00:28:00 -07:00
requirements.txt Initial commit for v4.0 2016-12-15 00:28:00 -07:00
setup.cfg Initial commit for v4.0 2016-12-15 00:28:00 -07:00
setup.py Initial commit for v4.0 2016-12-15 00:28:00 -07:00

README.md

Supported Python versions

CrackMapExec

A swiss army knife for pentesting Windows/Active Directory environments

Powered by Impacket

This project was inspired by/based off of:

Unintentional contributors:

This repo also includes the PowerSploit repository as a submodule.

#Documentation, Tutorials, Examples See the project's wiki for documentation and usage examples

#Description

CrackMapExec is your one-stop-shop for pentesting Windows/Active Directory environments!

From enumerating logged on users and spidering SMB shares to executing psexec style attacks, auto-injecting Mimikatz/Shellcode/DLL's into memory using Powershell, dumping the NTDS.dit and more!

The biggest improvements over the above tools are:

  • Pure Python script, no external tools required
  • Fully concurrent threading
  • Uses ONLY native WinAPI calls for discovering sessions, users, dumping SAM hashes etc...
  • Opsec safe (no binaries are uploaded to dump clear-text credentials, inject shellcode etc...)

Additionally, a database is used to store used/dumped credentals. It also automatically correlates Admin credentials to hosts and vice-versa allowing you to easily keep track of credential sets and gain additional situational awareness in large environments.

#Installation

Use virtualenvwrapper to install CrackMapExec in a python virtualenv

To get the latest stable version:

#~ pip install crackmapexec

If you like living on the bleeding-edge:

#~ git clone https://github.com/byt3bl33d3r/CrackMapExec
#- cd CrackMapExec && git submodule init && git submodule update --recursive
#~ python setup.py install

Note for Kali/Debian/Ubuntu Users:

If you get compilation errors run apt-get install -y libssl-dev libffi-dev python-dev build-essential and try again.

#To do

  • Kerberos support
  • 0wn everything