@@ -55,8 +55,9 @@ To install run ```pip install crackmapexec```
5555 @gojhonny's CredCrack https://github.com/gojhonny/CredCrack
5656 @pentestgeek's smbexec https://github.com/pentestgeek/smbexec
5757
58- Version: 3.0
59- Codename: 'So looong gay boy!'
58+ Version: 3.1
59+ Codename: 'Duchess'
60+
6061
6162positional arguments:
6263 target The target IP(s), range(s), CIDR(s), hostname(s), FQDN(s) or file(s) containg a list of targets
@@ -72,15 +73,18 @@ optional arguments:
7273 -p [PASSWORD [PASSWORD ...]]
7374 Password(s) or file(s) containing passwords
7475 -H [HASH [HASH ...]] NTLM hash(es) or file(s) containing NTLM hashes
75- -m MODULE Payload module to use
76+ -M MODULE, --module MODULE
77+ Payload module to use
7678 -o [MODULE_OPTION [MODULE_OPTION ...]]
7779 Payload module options
78- --module-info Display module info
80+ -L, --list-modules List available modules
81+ --show-options Display module options
7982 --share SHARE Specify a share (default: C$)
8083 --smb-port {139,445} SMB port (default: 445)
8184 --mssql-port PORT MSSQL port (default: 1433)
8285 --server {http,https}
8386 Use the selected server (default: https)
87+ --server-host HOST IP to bind the server to (default: 0.0.0.0)
8488 --server-port PORT Start the server on the specified port
8589 --local-auth Authenticate locally to each target
8690 --timeout TIMEOUT Max timeout in seconds of each thread (default: 20)
@@ -143,7 +147,8 @@ MSSQL Interaction:
143147 --mssql Switches CME into MSSQL Mode. If credentials are provided will authenticate against all discovered MSSQL DBs
144148 --mssql-query QUERY Execute the specifed query against the MSSQL DB
145149
146- HA! Made you look!
150+ I swear I had something for this...
151+
147152```
148153
149154#To do
0 commit comments