diff --git a/README.md b/README.md index 8bfe05853..17ee82457 100755 --- a/README.md +++ b/README.md @@ -1,4 +1,6 @@ -![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64) +# No Longer Maintained + +This project is no longer mantained due to the existence of a hostile fork. # CrackMapExec @@ -6,20 +8,12 @@ cme

-This project was initially created in 2015 by **@byt3bl33d3r**, in 2019 I started to invest myself in the project. Five years laters this awesome project is still maintained and up to date ! Lot of new additions have been made to create a tool still relevant to the new Active Directory attacks paths and countermeasures setup by Microsoft ! ⚔️ - You are on the **latest up-to-date** repository of the project CrackMapExec ! 🎉 - 🚧 If you want to report a problem, open un [Issue](https://github.com/mpgn/CrackMapExec/issues) - 🔀 If you want to contribute, open a [Pull Request](https://github.com/mpgn/CrackMapExec/pulls) - 💬 If you want to discuss, open a [Discussion](https://github.com/mpgn/CrackMapExec/discussions) -## Official Discord Channel - -If you don't have a Github account, you can ask your question on Discord - -[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy) - # Acknowledgments **(These are the people who did the hard stuff)**