![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64) :triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/ # CrackMapExec
## In partnership with ## :triangular_flag_on_post: Sponsors If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/ ## Official Discord Channel Come hang out on Discord! [![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy) # Acknowledgments **(These are the people who did the hard stuff)** This project was originally inspired by: - [CredCrack](https://github.com/gojhonny/CredCrack) - [smbexec](https://github.com/pentestgeek/smbexec) - [smbmap](https://github.com/ShawnDEvans/smbmap) Unintentional contributors: - The [Empire](https://github.com/PowerShellEmpire/Empire) project - @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script - @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project # Documentation, Tutorials, Examples See the project's [wiki](https://mpgn.gitbook.io/crackmapexec/) for documentation and usage examples # Installation Please see the installation on the [GitBook](https://mpgn.gitbook.io/crackmapexec/) # To do - ~~0wn everything~~