https://github.com/byt3n33dl3/crackmapexec
A swiss army Knife for Penetration testing Networks and Active Directory.
https://github.com/byt3n33dl3/crackmapexec
active-directory crackmapexec kerberos-attack networks offensive-security penetration-testing powershell python3
Last synced: 7 months ago
JSON representation
A swiss army Knife for Penetration testing Networks and Active Directory.
- Host: GitHub
- URL: https://github.com/byt3n33dl3/crackmapexec
- Owner: byt3n33dl3
- License: other
- Archived: true
- Created: 2024-03-23T08:00:10.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2025-01-04T00:51:09.000Z (9 months ago)
- Last Synced: 2025-03-28T15:46:47.710Z (7 months ago)
- Topics: active-directory, crackmapexec, kerberos-attack, networks, offensive-security, penetration-testing, powershell, python3
- Language: C#
- Homepage: https://netexec.wiki
- Size: 7.06 MB
- Stars: 41
- Watchers: 3
- Forks: 3
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
README
# CrackMapExec
![]()
## Continuing the `CrackMapExec` Project
[](https://www.gnu.org/licenses/gpl-3.0)
from [@byt3bl33d3r](https://github.com/byt3bl33d3r)
Buffing the **Password Spraying** ability attacks, which involve trying a few common `passwords` across many accounts to avoid account lockout. Then **User Hunting** attacks method, to identify where specific users are logged in within the network. This is useful for targeting specific high-value *accounts.*
## Kerberos Attacks
Upgrading this capabilities for performing Kerberos-based attacks such as AS-REP roasting and Kerberoasting.```shell
cme kerberos -u -p --asreproast
cme kerberos -u -p --kerberoast
```## Acknowledgments
**( These are the people who did the hard stuff )**This project was originally inspired by:
- [CredCrack](https://github.com/gojhonny/CredCrack)
- [smbexec](https://github.com/pentestgeek/smbexec)
- [smbmap](https://github.com/ShawnDEvans/smbmap)Unintentional contributors:
- The [Empire](https://github.com/PowerShellEmpire/Empire) project
- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) projectYou are on the **latest up-to-date** CrackMapExec
- If you want to report a problem, open un [Issue](https://github.com/byt3n33dl3/CrackMapExec/issues)
- If you want to contribute, open a [Pull Request](https://github.com/byt3n33dl3/CrackMapExec/pulls)
- If you want to discuss, open a [Discussion](https://github.com/byt3n33dl3/CrackMapExec/discussions)## Documentation, Tutorials, Examples
See the project's [wiki](https://www.crackmapexec.wiki/) for documentation and usage examples## Thanks to
>- byt3bl33d3r
- cube0x0 ( for SME )
- GhostPack ( Rubeus )## Installation
Please see the installation instructions on the [official wiki](https://www.crackmapexec.wiki/getting-started/installation)```shell
git clone https://github.com/byt3n33dl3/CrackMapExec
cd CrackMapExec
python3 build_collector.py
```## Code Contributors
Awesome code contributors of CrackMapExec
[](https://github.com/byt3n33dl3)
[](https://github.com/Marshall-Hallenbeck)
[](https://github.com/zblurx)
[](https://github.com/NeffIsBack)
[](https://github.com/Hackndo)
[](https://github.com/Projectdiscovery)