Table of contents π A swiss army knife for Pentesting networks 1β£ Tool π’ Linux Configuration Docker π’ Parameters Scan Optimization π’ Target Definition - CME Protocols 1β£ SMB CrackMapExec π’ SMB Modules β met_inject handlekatz π’ nanodump π’ procdump β enum_dns 2β£ LDAP CrackMapExec π LDAP Modules List π Extract LDAP users descriptions π’ Extract Network Information π’ Trust for Delegation π’ Admin Count π Kerberoasting π ASREPRoast π’ LAPS 3β£ MsSQL CrackMapExec π΅ MsSQL Modules FTP CrackMapExec SSH CrackMapExec RDP CrackMapExec WinRM CrackMapExec π₯· Integrations π΄ BloodHound and CrackMapExec π΄ DeathStar and CrackMapExec π₯· Get Reverse Shell π’ CME Reverse Shell with Metasploit π’ CME Reverse Shell with Empire π΄ CME Reverse Shell with Covenant Use Cases π₯ Scan for SMB Vulnerabilities using CrackMapExec π₯ Dump Credentials with CrackMapExec π₯ Anti Virus Bypass with CrackMapExec π₯· Dump Credentials Windows Machine Linux Machine π₯· Databases Workspaces Credentials