CrackMapExec Logo

CrackMapExec

0
Free
Visit Website

It's a post-exploitation tool (e.g. Veil-Pillage, smbexec) It's meant to be the 'glue' between exploitation frameworks when pentesting Active Directory It's fully concurrent: you're able to connect, authenticate etc.. to multiple hosts at the same time It has an internal database which is used to store credentials and track users with Administrative privileges It's functionality is based on several other tools and libraries (a list of them are in the Github repo's README) It's opsec safe: everything is either run in memory, enumerated over the network using WinAPI calls or executed using built-in windows tools/features. Part 1, will cover the basics such as using credentials, dumping credentials, executing commands and using the

FEATURES

ALTERNATIVES

A post-exploitation framework designed to operate covertly on heavily monitored environments.

Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.

A specification/framework for extending default C2 communication channels in Cobalt Strike

Adversary emulation framework for testing security measures in network environments.

Interactive online malware sandbox for real-time analysis and threat intelligence

Macro_Pack is a tool used to automate obfuscation and generation of Office documents for pentest, demo, and social engineering assessments.

A collection of Microsoft PowerShell modules for penetration testing purposes.

Docker image with essential tools for Kubernetes penetration testing.