Skip to content
This repository has been archived by the owner on Jan 4, 2025. It is now read-only.
/ CrackMapExec Public archive

A swiss army Knife for Penetration testing Networks and Active Directory.

License

Unknown, MIT licenses found

Licenses found

Unknown
LICENSE.md
MIT
LICENSE-MIT
Notifications You must be signed in to change notification settings

byt3n33dl3/CrackMapExec

Repository files navigation

CrackMapExec

CrackMapExec

CrackMapExec

License: BSD 3-Clause

Buffing the Password Spraying ability attacks, which involve trying a few common passwords across many accounts to avoid account lockout. Then User Hunting attacks method, to identify where specific users are logged in within the network. This is useful for targeting specific high-value accounts.

Kerberos Attacks

Upgrading this capabilities for performing Kerberos-based attacks such as AS-REP roasting and Kerberoasting.

cme kerberos <target> -u <username> -p <password> --asreproast
cme kerberos <target> -u <username> -p <password> --kerberoast

Acknowledgments

( These are the people who did the hard stuff )

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

You are on the latest up-to-date CrackMapExec

  • If you want to report a problem, open un Issue
  • If you want to contribute, open a Pull Request
  • If you want to discuss, open a Discussion

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Thanks to

  • Marcello
  • cube0x0 ( for SME )
  • GhostPack ( Rubeus )

Installation

Please see the installation instructions on the official wiki

git clone https://github.com/byt3n33dl3/CrackMapExec
cd CrackMapExec
python3 crackmapexec

Code Contributors

Awesome code contributors of CrackMapExec