The Network Execution Tool
 
 
 
Go to file
mpgn 215c479957 Fix spelling mistake 2021-05-30 16:28:37 -04:00
.github Add new workflow for Github Action 2020-09-11 16:35:55 -04:00
cme Fix spelling mistake 2021-05-30 16:28:37 -04:00
.dockerignore Fix for Docker Build 2020-09-20 09:23:16 -06:00
.gitignore building binary in the workflow 2020-12-09 18:30:33 +01:00
.gitmodules Bye Bye thirdparty folder 👋 #361 2021-02-28 09:00:12 -05:00
Dockerfile Fix for Docker Build 2020-09-20 09:23:16 -06:00
LICENSE Switched from Pipenv to Poetry 2020-09-20 07:59:10 -06:00
Makefile Bye Bye thirdparty folder 👋 #361 2021-02-28 09:00:12 -05:00
README.md Fix spelling mistake 2021-05-30 16:28:37 -04:00
build_collector.py update build collector script 2021-03-08 15:14:35 -05:00
crackmapexec.spec Bye Bye thirdparty folder 👋 #361 2021-02-28 09:00:12 -05:00
poetry.lock Update lsassy to version 2.1.4 to use latest version of pypykatz 2021-03-08 13:10:23 -05:00
pyproject.toml Bump to version 5.1.6 2021-03-08 14:44:58 -05:00
requirements-dev.txt Update requirements 2021-03-08 15:55:02 -05:00
requirements.txt Update requirements 2021-03-08 15:55:02 -05:00

README.md

Supported Python versions

CrackMapExec

cme

In partnership with

Sponsors

Official Discord Channel

Come hang out on Discord!

Porchetta Industries

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here or the GitBook

To do

  • 0wn everything