Skip to content

Commit 9ee46f5

Browse files
Update README.md
1 parent ff90a47 commit 9ee46f5

File tree

1 file changed

+34
-19
lines changed

1 file changed

+34
-19
lines changed

README.md

Lines changed: 34 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,48 @@
1-
## What is PsMapExec
21

2+
# PsMapExec
33

4-
<p align="Center">
5-
<img src="https://github.com/The-Viper-One/PsMapExec/assets/68926315/14770c85-b751-4127-8261-2e49ff25a8ad" width="280" height="280">
4+
<p align="center">
5+
<img src="https://github.com/user-attachments/assets/e471dc70-a4a1-4c5d-8c81-2a67a2927b3a"
6+
width="450"
7+
alt="PME_Logo"
8+
style="border:1px solid #ddd; border-radius:8px; box-shadow:2px 2px 10px rgba(0,0,0,0.1);">
69
</p>
710

8-
A PowerShell tool heavily inspired by the popular tool CrackMapExec / NetExec. PsMapExec aims to bring the function and feel of these tools to PowerShell with its own arsenal of improvements.
11+
---
912

10-
PsMapExec is used as a post-exploitation tool to assess and compromise an Active Directory environment.
13+
## 🚀 What is PsMapExec?
1114

12-
For any feedback or suggestions for additions to PsMapExec please use the discussion forum:
15+
**PsMapExec** is a PowerShell-based post-exploitation framework, heavily inspired by the well-known **CrackMapExec / NetExec** tools. It brings the familiar looks and function of these tools to native PowerShell with its own arsenal of improvements. This tool is designed to help penetration testers assess and dominate Active Directory environments with ease.
1316

14-
📈 https://github.com/The-Viper-One/PsMapExec/discussions
17+
> **Enjoying PsMapExec?** Show your support by starring the project and spreading the word.
18+
>
19+
> [![GitHub stars](https://img.shields.io/github/stars/The-Viper-One/PsMapExec?style=social)](https://github.com/The-Viper-One/PsMapExec/stargazers)
1520
16-
## How do I use it
1721

18-
It is highly recommended to go through the documentation detailed in the Wiki for usage guidance.
22+
## 📖 How Do I Use It?
1923

20-
📚 https://github.com/The-Viper-One/PsMapExec/wiki
24+
Full usage guidance is available on the project Wiki.
2125

22-
## Pro Tip
26+
- [PsMapExec Wiki](https://github.com/The-Viper-One/PsMapExec/wiki)
2327

24-
Pair PsMapExec with the enumeration capabilities of Invoke-Adenum if you want to assess Active Directory on easy mode
28+
## 💡 Pro Tip
2529

26-
🔍 https://github.com/Leo4j/Invoke-ADEnum
30+
Pair PsMapExec with Invoke-ADEnum for comprehensive and effortless Active Directory enumeration.
2731

28-
## Acknowledgements
29-
* https://github.com/Leo4j (A good friend and excellent pentester who has helped me with the code)
32+
- https://github.com/Leo4j/Invoke-ADEnum
33+
34+
---
35+
36+
## 📦 Dependencies
37+
38+
As of version **0.6.0**, PsMapExec is **self-contained** aside from the optional **Amnesiac module**.
39+
40+
> Can be run in restricted environments such as **exam labs** and **CTF machines**.
41+
42+
---
43+
44+
## 🍩 Acknowledgements
45+
* https://github.com/Leo4j (A good friend and excellent pentester)
3046
* https://github.com/GhostPack/Rubeus
3147
* https://github.com/gentilkiwi/mimikatz
3248
* https://github.com/OneScripter/WmiExec
@@ -37,15 +53,14 @@ Pair PsMapExec with the enumeration capabilities of Invoke-Adenum if you want to
3753
* https://github.com/elnerd/Get-NetNTLM
3854
* https://github.com/danielbohannon/Invoke-Obfuscation
3955

40-
## Dependencies
41-
Since version 0.6.0 PsMapExec now no longer has any external script dependencies apart from the Amnesiac module which will be resolved in a future update.
42-
PsMapExec can now, otherwise be run in restricted environments such as exam labs or CTF machines.
4356

57+
## ⚠️ Disclaimer
4458

45-
# Disclaimer
4659
PsMapExec is designed primarily for research, educational, and authorized testing scenarios. The purpose of developing and distributing PsMapExec is to provide professionals and researchers with a tool to understand and identify vulnerabilities and to bolster the security of systems. It is fundamentally imperative that users ensure they have obtained explicit, mutual consent from all involved parties before applying this tool on any system, network, or digital environment.
4760

4861
Engaging in unauthorized activities, including, but not limited to, accessing systems without permission, can lead to severe legal consequences. Users must be fully aware of, and adhere to, all their jurisdictional, local, state, and federal laws and regulations concerning cybersecurity and digital access.
4962

5063
The developers and contributors of PsMapExec expressly disclaim all liabilities and responsibilities for any unauthorized or illicit use of the tool. Additionally, they are not responsible for any consequent damages, losses, or repercussions stemming from the misuse or misapplication of PsMapExec.
5164

65+
---
66+

0 commit comments

Comments
 (0)