Registered by Jitendra Patro

A swiss army knife for pentesting networks

CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of "Living off the Land": abusing built-in Active Directory features/protocols to achieve it's functionality and allowing it to evade most endpoint protection/IDS/IPS solutions.

  CME makes heavy use of the impacket library (developed by @asolino) for working with network protocols and performing a variety of post-exploitation techniques.

  Although meant to be used primarily for offensive purposes (e.g. red teams, internal pentest), CME can be used by blue teams as well to assess account privileges, find possible misconfigurations and simulate
attack scenarios.

  CrackMapExec is developed by @byt3bl33d3r and @mpgn

Project information

Maintainer:
Jitendra Patro
Driver:
Jitendra Patro
Licence:
GNU GPL v3

RDF metadata

View full history Series and milestones

trunk series is the current focus of development.

All code Code

Version control system:
Git

Get Involved

  • warning
    Report a bug
  • warning
    Ask a question
  • warning
    Help translate

Downloads

CrackMapExec does not have any download files registered with Launchpad.