byt3bl33d3r / CrackMapExec
A swiss army knife for pentesting networks
AI Architecture Analysis
This repository is indexed by RepoMind. By analyzing byt3bl33d3r/CrackMapExec in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.
Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.
Repository Summary (README)
PreviewNo Longer Maintained
This project is no longer mantained due to the existence of a hostile fork.
CrackMapExec
<p align="center"> <img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/> </p>You are on the latest up-to-date repository of the project CrackMapExec ! 🎉
- 🚧 If you want to report a problem, open un Issue
- 🔀 If you want to contribute, open a Pull Request
- 💬 If you want to discuss, open a Discussion
Acknowledgments
(These are the people who did the hard stuff)
This project was originally inspired by:
Unintentional contributors:
- The Empire project
- @T-S-A's smbspider script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project
Documentation, Tutorials, Examples
See the project's wiki for documentation and usage examples
Installation
Please see the installation instructions on the official wiki
Code Contributors
Awesome code contributors of CME:
To do
0wn everything



