2021-10-22 18:47:37 +00:00
![Supported Python versions ](https://img.shields.io/badge/python-3.7+-blue.svg ) [![Twitter ](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social )](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter ](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social )](https://twitter.com/intent/follow?screen_name=mpgn_x64)
2017-04-25 22:13:58 +00:00
2021-10-16 19:58:13 +00:00
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
2017-04-25 22:16:50 +00:00
# CrackMapExec
2017-04-25 21:53:33 +00:00
< p align = "center" >
< img src = "https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt = "cme" / >
< / p >
2015-08-19 17:17:54 +00:00
2020-11-16 20:29:17 +00:00
## In partnership with
2022-08-01 17:40:39 +00:00
< p float = "left" >
< a href = "https://www.kali.org/" >
< img src = "https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png" width = "300" align = "left" / >
< / a >
< a href = "https://focal-point.com/services/penetration-testing/" >
< img src = "https://user-images.githubusercontent.com/5151193/182207768-f53d7e0e-5bd5-40cf-8734-dfa6a40a738e.png" width = "300" / >
< / a >
< / p >
2020-11-16 20:29:17 +00:00
2021-10-16 19:58:13 +00:00
## :triangular_flag_on_post: Sponsors
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
2020-06-26 03:30:29 +00:00
2021-10-16 19:58:13 +00:00
## Official Discord Channel
2020-07-26 23:07:37 +00:00
Come hang out on Discord!
[![Porchetta Industries ](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3 )](https://discord.gg/ycGXUxy)
2017-03-27 21:12:20 +00:00
# Acknowledgments
2017-03-27 21:09:36 +00:00
**(These are the people who did the hard stuff)**
2015-08-19 17:17:54 +00:00
2017-03-27 21:09:36 +00:00
This project was originally inspired by:
- [CredCrack ](https://github.com/gojhonny/CredCrack )
- [smbexec ](https://github.com/pentestgeek/smbexec )
2021-05-30 20:28:37 +00:00
- [smbmap ](https://github.com/ShawnDEvans/smbmap )
2015-08-19 17:17:54 +00:00
2016-03-28 06:25:19 +00:00
Unintentional contributors:
- The [Empire ](https://github.com/PowerShellEmpire/Empire ) project
2017-03-27 21:09:36 +00:00
- @T -S-A's [smbspider ](https://github.com/T-S-A/smbspider ) script
2017-10-25 07:02:55 +00:00
- @ConsciousHacker 's partial Python port of Invoke-obfuscation from the [GreatSCT ](https://github.com/GreatSCT/GreatSCT ) project
2015-08-19 17:17:54 +00:00
2017-03-27 21:12:20 +00:00
# Documentation, Tutorials, Examples
2023-02-07 15:42:48 +00:00
See the project's [wiki ](https://wiki.porchetta.industries/ ) for documentation and usage examples
2016-08-14 05:02:20 +00:00
2017-03-27 21:12:20 +00:00
# Installation
2023-02-07 15:42:48 +00:00
Please see the installation on the [GitBook ](https://wiki.porchetta.industries/getting-started/installation )
2016-06-04 08:12:04 +00:00
2023-06-26 21:21:48 +00:00
# Code Contributors
Awesome code contributors of CME:
[![ ](https://github.com/Marshall-Hallenbeck.png?size=50 )](https://github.com/Marshall-Hallenbeck)
[![ ](https://github.com/zblurx.png?size=50 )](https://github.com/zblurx)
[![ ](https://github.com/NeffIsBack.png?size=50 )](https://github.com/NeffIsBack)
[![ ](https://github.com/Hackndo.png?size=50 )](https://github.com/Hackndo)
[![ ](https://github.com/nurfed1?size=50 )](https://github.com/nurfed1)
2017-03-27 21:12:20 +00:00
# To do
2017-04-25 21:53:33 +00:00
- ~~0wn everything~~