The Network Execution Tool
 
 
 
Go to file
r4wd3r 144206cf34
Add rid_hijack documentation to README
2019-02-24 20:52:44 -05:00
.github Update ISSUE_TEMPLATE.md 2017-10-24 21:10:11 -06:00
cme Add rid_hijack.py module 2019-02-24 20:51:16 -05:00
.gitignore Initial commit for v4.0 2016-12-15 00:28:00 -07:00
.gitmodules Add RID-Hijacking submodule 2019-02-24 20:50:03 -05:00
LICENSE Initial commit for v4.0 2016-12-15 00:28:00 -07:00
MANIFEST.in Refactored Database Menu code 2017-11-02 17:43:08 +08:00
Makefile Added WINRM support, NMap XML and .Nessus parsing 2017-10-24 20:08:19 -06:00
Pipfile Refactored Database Menu code 2017-11-02 17:43:08 +08:00
Pipfile.lock Updated all submodules and packages 2018-08-29 15:33:02 +08:00
README.md Add rid_hijack documentation to README 2019-02-24 20:52:44 -05:00
README.rst Add rid_hijack documentation to README 2019-02-24 20:52:44 -05:00
requirements.txt Updated requirements.txt 2018-08-29 15:35:03 +08:00
setup.cfg Added README.rst 2017-10-21 20:36:34 -06:00
setup.py adding shabang 2019-02-05 13:31:02 -06:00

README.md

Supported Python versions

CrackMapExec

cme

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here.

How to fund my tea & sushi reserve

BTC: 1ER8rRE6NTZ7RHN88zc6JY87LvtyuRUJGU

ETH: 0x91d9aDCf8B91f55BCBF0841616A01BeE551E90ee

LTC: LLMa2bsvXbgBGnnBwiXYazsj7Uz6zRe4fr

To do

  • Kerberos support
  • 0wn everything