Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/byt3n33dl3/crackmapexec
A swiss army Knife for PenTesting Networks and Active Directory. This project is no longer mantained due to the Original CrackMapExec
https://github.com/byt3n33dl3/crackmapexec
active-directory crackmapexec kerberos-attack networks offensive-security penetration-testing powershell python3
Last synced: 6 days ago
JSON representation
A swiss army Knife for PenTesting Networks and Active Directory. This project is no longer mantained due to the Original CrackMapExec
- Host: GitHub
- URL: https://github.com/byt3n33dl3/crackmapexec
- Owner: byt3n33dl3
- License: other
- Created: 2024-03-23T08:00:10.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-10-27T04:56:45.000Z (11 days ago)
- Last Synced: 2024-10-28T06:41:16.350Z (10 days ago)
- Topics: active-directory, crackmapexec, kerberos-attack, networks, offensive-security, penetration-testing, powershell, python3
- Language: C#
- Homepage: https://www.kali.org/tools/crackmapexec
- Size: 6.56 MB
- Stars: 22
- Watchers: 3
- Forks: 3
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
README
# CrackMapExec
## Continuing the `CrackMapExec` Project
[![License: BSD 3-Clause](https://img.shields.io/badge/License-BSDv3-blue.svg)](https://www.gnu.org/licenses/gpl-3.0)
from [@byt3bl33d3r](https://github.com/byt3bl33d3r)
Buffing the **Password Spraying** ability attacks, which involve trying a few common `passwords` across many accounts to avoid account lockout. Then **User Hunting** attacks method, to identify where specific users are logged in within the network. This is useful for targeting specific high-value *accounts.*
## Kerberos Attacks
Upgrading this capabilities for performing Kerberos-based attacks such as AS-REP roasting and Kerberoasting.```shell
cme kerberos -u -p --asreproast
cme kerberos -u -p --kerberoast
```## Acknowledgments
**( These are the people who did the hard stuff )**This project was originally inspired by:
- [CredCrack](https://github.com/gojhonny/CredCrack)
- [smbexec](https://github.com/pentestgeek/smbexec)
- [smbmap](https://github.com/ShawnDEvans/smbmap)Unintentional contributors:
- The [Empire](https://github.com/PowerShellEmpire/Empire) project
- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) projectYou are on the **latest up-to-date** CrackMapExec
- If you want to report a problem, open un [Issue](https://github.com/byt3n33dl3/CrackMapExec/issues)
- If you want to contribute, open a [Pull Request](https://github.com/byt3n33dl3/CrackMapExec/pulls)
- If you want to discuss, open a [Discussion](https://github.com/byt3n33dl3/CrackMapExec/discussions)## Documentation, Tutorials, Examples
See the project's [wiki](https://www.crackmapexec.wiki/) for documentation and usage examples## Thanks to
>- byt3bl33d3r
- cube0x0 ( for SME )
- GhostPack ( Rubeus )## Installation
Please see the installation instructions on the [official wiki](https://www.crackmapexec.wiki/getting-started/installation)```shell
git clone https://github.com/byt3n33dl3/CrackMapExec
cd CrackMapExec
python3 build_collector.py
```## Code Contributors
Awesome code contributors of CrackMapExec
[![](https://github.com/byt3n33dl3.png?size=50)](https://github.com/byt3n33dl3)
[![](https://github.com/Marshall-Hallenbeck.png?size=50)](https://github.com/Marshall-Hallenbeck)
[![](https://github.com/zblurx.png?size=50)](https://github.com/zblurx)
[![](https://github.com/NeffIsBack.png?size=50)](https://github.com/NeffIsBack)
[![](https://github.com/Hackndo.png?size=50)](https://github.com/Hackndo)
[![](https://github.com/Projectdiscovery.png?size=50)](https://github.com/Projectdiscovery)