CrackMapExec Logo

CrackMapExec

0
Free
Visit Website

It's a post-exploitation tool (e.g. Veil-Pillage, smbexec) It's meant to be the 'glue' between exploitation frameworks when pentesting Active Directory It's fully concurrent: you're able to connect, authenticate etc.. to multiple hosts at the same time It has an internal database which is used to store credentials and track users with Administrative privileges It's functionality is based on several other tools and libraries (a list of them are in the Github repo's README) It's opsec safe: everything is either run in memory, enumerated over the network using WinAPI calls or executed using built-in windows tools/features. Part 1, will cover the basics such as using credentials, dumping credentials, executing commands and using the

FEATURES

ALTERNATIVES

A comprehensive guide for customizing Cobalt Strike's C2 profiles to enhance stealth and operational security.

A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.

A DNS rebinding attack framework for security researchers and penetration testers.

Full-featured C2 framework for stealthy communication and control on web servers.

Generate a variety of suspect actions detected by Falco rulesets.

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.

Emulate operating systems behind SSH servers for testing automation.

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved