Awesome Security Products

Awesome cybersecurity Products

Infosec Worrier

A PowerShell tool heavily inspired by the popular tool CrackMapExec. PsMapExec is used as a post-exploitation tool to assess and compromise an Active Directory environment.

https://github.com/The-Viper-One/PsMapExec

#hacking #redteam #pentesting #cme #crackmapexec

GitHub - The-Viper-One/PsMapExec: A PowerShell tool that takes strong inspiration from CrackMapExec.

A PowerShell tool that takes strong inspiration from CrackMapExec. - GitHub - The-Viper-One/PsMapExec: A PowerShell tool that takes strong inspiration from CrackMapExec.

GitHub

If you enjoy and use CrackMapExec like I do this is a really wild thread about the future of the tool:

https://github.com/byt3bl33d3r/CrackMapExec/discussions/801

#cme #crackmapexec #hacking #pentesting #redteam

So what happens now? the future of CrackMapExec · byt3bl33d3r/CrackMapExec · Discussion #801

I'm very concerned. Is my favourite tool in danger of extinction? Who's running the show now?

GitHub

Looks like @mpgn is dropping from the CrackMapExec project.

I wish him and his family well. Amazing work was done and hope his future is bright, restful, and fulfilling!

Cheers, mpgn!

#infosec #hacking #crackMapExec

https://www.crackmapexec.wiki/news/good-bye-everyone

Good bye everyone

mpgn is withdrawing himself from the #CrackMapExec 😢https://twitter.com/mpgn_x64/status/1698990491243606226, hopefully there is not too much drama behind the scene.
mpgn on X

Hello everyone, The last release of CME was my final one for CrackMapExec 😊 I have decided to withdraw myself from the development of the tool to focus on my family and personal projects. The official repository and the most up-to-date version of CrackMapExec can be found on…

X (formerly Twitter)

CrackMapExec now includes DPAPI cred dumping as a core feature thanks to the dploot library by Thomas Seigneuret from the Orange Cyberdefense French team.

Picture from @mpgn’s bird account.

#CrackMapExec #DPAPI

Ringing in Black Friday by landing a domain controller in my OSCP lab. Pivoted through three machines to get here, but I've arrived! I'd like to thank my friends: mimikatz (an outdated version), autorecon, an unpatched web app with default creds, crackmapexec, certutil, reg save, john, kerberoasting, OneNote, vscode. The list of tools goes on and on. :---) #OSCP #mimikatz #autorecon #crackmapexec #JohnTheRipper #Kerberoasting #pentesting