NetExec/README.md

67 lines
2.8 KiB
Markdown
Raw Normal View History

2021-10-22 18:47:37 +00:00
![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
2017-04-25 22:13:58 +00:00
2021-10-16 19:58:13 +00:00
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
2017-04-25 22:16:50 +00:00
# CrackMapExec
2017-04-25 21:53:33 +00:00
<p align="center">
<img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
</p>
2015-08-19 17:17:54 +00:00
2020-11-16 20:29:17 +00:00
## In partnership with
2022-08-01 17:40:39 +00:00
<p float="left">
<a href="https://www.kali.org/">
<img src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png" width="300" align="left"/>
</a>
<a href="https://focal-point.com/services/penetration-testing/">
<img src="https://user-images.githubusercontent.com/5151193/182207768-f53d7e0e-5bd5-40cf-8734-dfa6a40a738e.png" width="300"/>
</a>
</p>
2020-11-16 20:29:17 +00:00
2021-10-16 19:58:13 +00:00
## :triangular_flag_on_post: Sponsors
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
2020-06-26 03:30:29 +00:00
2021-10-16 19:58:13 +00:00
## Official Discord Channel
Come hang out on Discord!
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
2017-03-27 21:12:20 +00:00
# Acknowledgments
2017-03-27 21:09:36 +00:00
**(These are the people who did the hard stuff)**
2015-08-19 17:17:54 +00:00
2017-03-27 21:09:36 +00:00
This project was originally inspired by:
- [CredCrack](https://github.com/gojhonny/CredCrack)
- [smbexec](https://github.com/pentestgeek/smbexec)
2021-05-30 20:28:37 +00:00
- [smbmap](https://github.com/ShawnDEvans/smbmap)
2015-08-19 17:17:54 +00:00
2016-03-28 06:25:19 +00:00
Unintentional contributors:
- The [Empire](https://github.com/PowerShellEmpire/Empire) project
2017-03-27 21:09:36 +00:00
- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
2017-10-25 07:02:55 +00:00
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
2015-08-19 17:17:54 +00:00
2017-03-27 21:12:20 +00:00
# Documentation, Tutorials, Examples
2023-02-07 15:42:48 +00:00
See the project's [wiki](https://wiki.porchetta.industries/) for documentation and usage examples
2016-08-14 05:02:20 +00:00
2017-03-27 21:12:20 +00:00
# Installation
2023-02-07 15:42:48 +00:00
Please see the installation on the [GitBook](https://wiki.porchetta.industries/getting-started/installation)
2023-06-26 21:21:48 +00:00
# Code Contributors
Awesome code contributors of CME:
[![](https://github.com/Marshall-Hallenbeck.png?size=50)](https://github.com/Marshall-Hallenbeck)
[![](https://github.com/zblurx.png?size=50)](https://github.com/zblurx)
[![](https://github.com/NeffIsBack.png?size=50)](https://github.com/NeffIsBack)
[![](https://github.com/Hackndo.png?size=50)](https://github.com/Hackndo)
[![](https://github.com/nurfed1?size=50)](https://github.com/nurfed1)
2017-03-27 21:12:20 +00:00
# To do
2017-04-25 21:53:33 +00:00
- ~~0wn everything~~