CrackMapExec
FeaturedBSD-2-Clause馃挜 Exploitation 路 Python
CrackMapExec is a versatile tool for pentesting Active Directory environments, offering capabilities for SMB, LDAP, MSSQL, and WinRM enumeration and exploitation. It facilitates lateral movement and credential spraying attacks while providing a comprehensive interface for testing domain credentials and configurations. Written in Python, it is favored by security professionals for its integration with offensive security operations, allowing for efficient discovery and exploitation of network vulnerabilities.
Installation
$ pip install crackmapexecTags
Details
- Category
- 馃挜 Exploitation
- Language
- Python
- Repository
- byt3bl33d3r/CrackMapExec
- License
- BSD-2-Clause
- Platforms
- 馃惂linux馃崕macos
Links
Used in 3 Workflows
Community Reviews
Alternatives & Comparisons
BloodHound
GoActive Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Compare CrackMapExec vs BloodHoundNetExec
PythonNetwork execution tool - the maintained successor to CrackMapExec. SMB, LDAP, WinRM, SSH, MSSQL, and more.
Compare CrackMapExec vs NetExecMore in Exploitation
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
BloodHound
GoActive Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
Evil-WinRM
RubyUltimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
Covenant
C#.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.
Sliver
GoOpen-source C2 framework by BishopFox. mTLS, HTTP(S), DNS, WireGuard implants with multi-operator support.