Skip to content

Commit 3e6bd9f

Browse files
authored
Update README.md
1 parent 60f1e12 commit 3e6bd9f

File tree

1 file changed

+9
-26
lines changed

1 file changed

+9
-26
lines changed

README.md

Lines changed: 9 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,19 @@
11
![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
22

3-
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
3+
This project was initially created in 2016 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️
4+
5+
You are on the latest up-to-date repository of the project CrackMapExec ! 🎉
6+
7+
- 🚧 If you want to report a problem, open un [Issue](https://github.com/mpgn/CrackMapExec/issues)
8+
- 🔀 If you want to contribute, open a [Pull Request](https://github.com/mpgn/CrackMapExec/pulls)
9+
- 💬 If you want to discuss, open a [Discussion](https://github.com/mpgn/CrackMapExec/discussions)
410

511
# CrackMapExec
612

713
<p align="center">
814
<img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
915
</p>
1016

11-
12-
## In partnership with
13-
14-
<p float="left">
15-
<a href="https://www.kali.org/">
16-
<img src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png" width="300" align="left"/>
17-
</a>
18-
19-
<a href="https://focal-point.com/services/penetration-testing/">
20-
<img src="https://user-images.githubusercontent.com/5151193/182207768-f53d7e0e-5bd5-40cf-8734-dfa6a40a738e.png" width="300"/>
21-
</a>
22-
</p>
23-
24-
## :triangular_flag_on_post: Sponsors
25-
26-
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
27-
28-
## Official Discord Channel
29-
30-
Come hang out on Discord!
31-
32-
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
33-
3417
# Acknowledgments
3518
**(These are the people who did the hard stuff)**
3619

@@ -46,10 +29,10 @@ Unintentional contributors:
4629
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
4730

4831
# Documentation, Tutorials, Examples
49-
See the project's [wiki](https://wiki.porchetta.industries/) for documentation and usage examples
32+
See the project's [wiki](https://www.crackmapexec.wiki/) for documentation and usage examples
5033

5134
# Installation
52-
Please see the installation on the [GitBook](https://wiki.porchetta.industries/getting-started/installation)
35+
Please see the installation on the [GitBook](https://www.crackmapexec.wiki/getting-started/installation)
5336

5437
# Code Contributors
5538

0 commit comments

Comments
 (0)