🧨
🧨
🧨
🧨
CrackMapExec 5.4.0
HomeDiscord
Search
⌃K
Links
💞
A swiss army knife for Pentesting networks
Author
😇
Docs Author
Installation
🟢
Linux
Windows
Docker
⭐
Ansible
Tool
🟢
Parameters
Scan Optimization
🟢
Target Definition - CME
Protocols
1⃣
Exploiting SMB Protocol
2⃣
LDAP - CrackMapExec
3⃣
MsSQL - CrackMapExec
FTP - CrackMapExec
SSH - CrackMapExec
RDP - CrackMapExec
WinRM - CrackMapExec
🥷
Integrations
🔴
BloodHound and CrackMapExec
🟠
Metasploit and CrackMapExec
🟢
Impacket and CrackMapExec
🔴
Covenant and CrackMapExec
🔴
DeathStar and CrackMapExec
🔴
Cobalt Strike and CrackMapExec
🥷
Get Reverse Shell
🔴
CME Reverse Shell with Empire
🔴
CME Reverse Shell with Metasploit
🔴
CME Reverse Shell with Covenant
🥷
Dump Credentials
Windows Machine
Linux Machine
🥷
Databases
Workspaces
Credentials
Use Cases
🔥
Scan for SMB Vulnerabilities using CrackMapExec
🔥
Dump Credentials with CrackMapExec
🔥
Anti Virus Bypass with CrackMapExec
Powered By GitBook
🔥

Scan for SMB Vulnerabilities using CrackMapExec

Scan for Samba vulnerabilities with CrackMapExec

ZeroLogon

crackmapexec smb <ip> -u '' -p '' -M zerologo

PetitPotam

crackmapexec smb <ip> -u '' -p '' -M petitpotam

noPAC

crackmapexec smb <ip> -u 'user' -p 'pass' -M nopac
Databases - Previous
Credentials
Next - Use Cases
Dump Credentials with CrackMapExec
Last modified 3mo ago
Copy link
On this page
ZeroLogon
PetitPotam
noPAC