NetExec/README.md

62 lines
2.9 KiB
Markdown
Executable File

![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
# CrackMapExec
<p align="center">
<img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
</p>
## In partnership with
<p align="center"><img height=150 width=300 src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png"/></p>
## :triangular_flag_on_post: Sponsors
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
## Official Discord Channel
Come hang out on Discord!
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
# Acknowledgments
**(These are the people who did the hard stuff)**
This project was originally inspired by:
- [CredCrack](https://github.com/gojhonny/CredCrack)
- [smbexec](https://github.com/pentestgeek/smbexec)
- [smbmap](https://github.com/ShawnDEvans/smbmap)
Unintentional contributors:
- The [Empire](https://github.com/PowerShellEmpire/Empire) project
- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
This repository contains the following repositories as submodules:
- [Impacket](https://github.com/CoreSecurity/impacket) ♥️
- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation)
- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc)
- [Mimikittenz](https://github.com/putterpanda/mimikittenz)
- [Mimipenguin](https://github.com/huntergregal/mimipenguin)
- [NetRipper](https://github.com/NytroRST/NetRipper)
- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit)
- [Pypsrp](https://github.com/jborean93/pypsrp)
- [Pywerview](https://github.com/the-useless-one/pywerview)
- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts)
- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking)
- [SessionGopher](https://github.com/fireeye/SessionGopher)
# Documentation, Tutorials, Examples
See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples
# Installation
Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/)
# To do
- ~~0wn everything~~