f354559cb5 | ||
---|---|---|
.github | ||
cme | ||
tests | ||
.dockerignore | ||
.gitignore | ||
.gitmodules | ||
Dockerfile | ||
LICENSE | ||
Makefile | ||
README.md | ||
build_collector.py | ||
crackmapexec.spec | ||
flake.lock | ||
flake.nix | ||
poetry.lock | ||
pyproject.toml | ||
shell.nix |
README.md
CrackMapExec
This project was initially created in 2016 by @byt3bl33d3r, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️
You are on the latest up-to-date repository of the project CrackMapExec ! 🎉
- 🚧 If you want to report a problem, open un Issue
- 🔀 If you want to contribute, open a Pull Request
- 💬 If you want to discuss, open a Discussion
Acknowledgments
(These are the people who did the hard stuff)
This project was originally inspired by:
Unintentional contributors:
- The Empire project
- @T-S-A's smbspider script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project
Documentation, Tutorials, Examples
See the project's wiki for documentation and usage examples
Installation
Please see the installation on the GitBook
Code Contributors
Awesome code contributors of CME:
To do
0wn everything