ansible-ad-inventory VS CrackMapExec

Compare ansible-ad-inventory vs CrackMapExec and see what are their differences.


A swiss army knife for pentesting networks (by Porchetta-Industries)
Our great sponsors
  • Scout APM - Truly a developer’s best friend
  • - Download’s Tech Salary Report
  • SonarLint - Clean code begins in your IDE with SonarLint
  • InfluxDB - Build time-series-based applications quickly and at scale.
ansible-ad-inventory CrackMapExec
2 6
22 6,476
- 3.0%
1.5 9.3
10 months ago 1 day ago
Python Python
MIT License BSD 2-clause "Simplified" License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.


Posts with mentions or reviews of ansible-ad-inventory. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-06-05.


Posts with mentions or reviews of CrackMapExec. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-08-18.
  • Active Directory in CTFs
    4 projects | | 18 Aug 2022
    Attackers like to use crackmapexec to exploit Windows networks and machines. It can achieve various goals like enumerating users, cracking SMB shares, and injecting shellcode into memory.
  • TOOL: ntlmrelayx2proxychains
    4 projects | | 16 Mar 2022
    ntlmrelayx2proxychains aims to connect the tool of the SecureAuthCorps' impacket suite, (hereafter referred to as "ntlmrelayx"), along with @byt3bl33d3r's tool, CrackMapExec (hereafter referred to as "CME"), over proxychains, developped by haad.
  • Awesome Penetration Testing
    124 projects | | 6 Oct 2021
    CrackMapExec - Swiss army knife for pentesting networks.
  • Mapping AD
    2 projects | | 31 Mar 2021
    Regarding network shares, I personally tend to use crackmapexec with a list of systems. It won't list the ACLs but it is very good at finding out what a standard domain user could access (if this is what you are after)

What are some alternatives?

When comparing ansible-ad-inventory and CrackMapExec you can also consider the following projects:

proxychains - proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.

BloodHound - Six Degrees of Domain Admin

impacket - Impacket is a collection of Python classes for working with network protocols.

Metasploit - Metasploit Framework

Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡

sam-the-admin - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user

laps-web - A web site for managing access to local admin passwords managed by Microsoft LAPS

RustScan - 🤖 The Modern Port Scanner 🤖

vsphere-automation-sdk-python - Python samples, language bindings, and API reference documentation for vSphere, VMC, and NSX-T using the VMware REST API

john - John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs

scapy - Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.

SQLMap - Automatic SQL injection and database takeover tool