The Network Execution Tool
 
 
 
Go to file
Alexander Neff 0da869f236 Fix spelling mistake causing "first_run" to be executed twice 2023-05-28 00:09:37 +02:00
.github Updated bug_report.md template 2023-04-30 11:43:44 +02:00
cme Fix spelling mistake causing "first_run" to be executed twice 2023-05-28 00:09:37 +02:00
tests tests: fix first line of e2e tests and comment out some long-running/hanging modules, and add in commented SSH tests 2023-04-30 17:25:13 -04:00
.dockerignore Fix for Docker Build 2020-09-20 09:23:16 -06:00
.gitignore chore(gitignore): add .idea to gitignore 2023-03-13 15:55:46 -04:00
.gitlab-ci.yml Update .gitlab-ci.yml 2021-11-18 15:39:44 +00:00
.gitmodules Cleanup cme 2022-06-20 07:53:30 -04:00
Dockerfile Fix #686 2022-12-12 14:39:29 -05:00
LICENSE change URL to porchetta industries github 2022-07-03 14:15:44 -04:00
Makefile Bye Bye thirdparty folder 👋 #361 2021-02-28 09:00:12 -05:00
README.md [chore] update wiki link 2023-02-12 09:19:34 -05:00
build_collector.py clean up imports 2023-04-07 13:12:56 -04:00
crackmapexec.spec Fix #475 #456 thanks @Qazeer 2021-10-16 16:22:37 -04:00
flake.lock Add Nix Flake support 2022-04-29 16:35:48 +00:00
flake.nix Finish updating Nix support 2022-04-29 16:57:49 +00:00
poetry.lock Revert poetry.lock file 2023-04-15 16:47:23 +02:00
pyproject.toml update lsassy to 3.1.8 2023-04-08 14:06:18 -04:00
requirements.txt update requierements file 2023-03-28 07:33:48 -04:00
shell.nix Add Nix Shell support 2022-04-29 16:36:28 +00:00

README.md

Supported Python versions Twitter Twitter

🚩 This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/

CrackMapExec

cme

In partnership with

🚩 Sponsors

If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/

Official Discord Channel

Come hang out on Discord!

Porchetta Industries

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation on the GitBook

To do

  • 0wn everything