The Network Execution Tool
 
 
 
Go to file
byt3bl33d3r 240cb56804
Update docker.yml
2020-07-13 01:44:31 -03:00
.github Update docker.yml 2020-07-13 01:44:31 -03:00
cme Fix os import and add the dump optional using READ_ONLY option 2020-07-05 16:58:09 -04:00
.dockerignore Added dockerfile 2020-06-29 09:54:00 -06:00
.gitignore Normalize path for pyinstaller linux/windows 2020-05-11 13:48:03 -04:00
.gitmodules dockerhub with pywerview testing 2020-06-30 19:05:54 -04:00
Dockerfile Fixed dockerfile 2020-06-29 10:27:49 -06:00
LICENSE Initial commit for v4.0 2016-12-15 00:28:00 -07:00
MANIFEST.in Merge pull request #295 from r4wd3r/rid_hijacking 2020-04-19 14:36:47 -03:00
Makefile Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
Pipfile Update winrm method to allows code execution from normal user 2020-04-28 15:30:18 -04:00
Pipfile.lock Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
README.md Update README.md 2020-07-04 18:19:48 -03:00
crackmapexec.spec Normalize path for pyinstaller linux/windows 2020-05-11 13:48:03 -04:00
requirements.txt Add module - Set as owned in BloodHound 2020-05-05 09:59:30 +02:00
setup.cfg Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
setup.py Bump to 5.1.0dev 2020-06-25 21:25:31 -04:00

README.md

Supported Python versions

CrackMapExec

cme

Sponsors

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here or the GitBook

To do

  • 0wn everything