CRACKMAPEXEC v5.4 – A swiss army knife for pentesting networks

CRACKMAPEXEC V4.0

CRACKMAPEXEC

CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of “Living off the Land”: abusing built-in Active Directory features/protocols to achieve its functionality and allowing it to evade most endpoint protection/IDS/IPS solutions.

CME makes heavy use of the Impacket library (developed by @asolino) and the PowerSploit Toolkit (developed by @mattifestation) for working with network protocols and performing a variety of post-exploitation techniques.

Although meant to be used primarily for offensive purposes (e.g. red teams), CME can be used by blue teams as well to assess account privileges, find possible misconfiguration, and simulate attack scenarios.

CrackMapExec is developed by @byt3bl33d3r

This repository contains the following repositories as submodules:

 

Changelog v5.4

What’s Changed

DownloadTutorial

Demo

Using the empire_exec module in CrackMapExec v4.0

Using the met_inject module in CrackMapExec v4.0

Copyright (c) 2020, byt3bl33d3r

Sourcehttps://github.com/byt3bl33d3r/