Request for aliases for CrackMapExec commands:- cme
and cmedb
.
name: crackmapexec
summary: A swiss army knife for pentesting networks
publisher: -
store-url: https://snapcraft.io/crackmapexec
license: GPL-3.0-or-later
description: |
CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of
large Active Directory networks. Built with stealth in mind, CME follows the concept of "Living
off the Land": abusing built-in Active Directory features/protocols to achieve it's functionality
and allowing it to evade most endpoint protection/IDS/IPS solutions.
CME makes heavy use of the **impacket** library (developed by **@asolino**) for working with
network protocols and performing a variety of post-exploitation techniques.
Although meant to be used primarily for offensive purposes (e.g. red teams, internal pentest), CME
can be used by blue teams as well to assess account privileges, find possible misconfigurations
and simulate attack scenarios.
**CrackMapExec** is developed by **@byt3bl33d3r** and **@mpgn**
Installation: `snap install --edge crackmapexec`
User's Manual:- https://wiki.porchetta.industries/
commands:
- crackmapexec.cme
- crackmapexec.cmedb
- crackmapexec
snap-id: sCj74gWrRHGxHTTUb9utKK5w3PfAlDNu
tracking: latest/edge
refresh-date: today at 20:59 IST
channels:
latest/stable: –
latest/candidate: v5.3.0-54-g21b5adb 2022-09-29 (9) 105MB -
latest/beta: v5.3.0-54-g21b5adb 2022-09-29 (9) 105MB -
latest/edge: v5.3.0-54-g21b5adb 2022-09-26 (6) 105MB -