The Network Execution Tool
 
 
 
Go to file
byt3bl33d3r 498f3fc197
Merge pull request #327 from noraj/patch-1
lsa secrets: dump file extension
2020-04-19 14:32:48 -03:00
.github Update FUNDING.yml 2020-02-04 05:04:02 -07:00
cme Merge pull request #327 from noraj/patch-1 2020-04-19 14:32:48 -03:00
.gitignore Migrate cmedb to python3 2019-11-12 16:39:26 -05:00
.gitmodules Switch pywinrm thirdparty to pip 2020-02-15 06:01:14 -05:00
LICENSE Initial commit for v4.0 2016-12-15 00:28:00 -07:00
MANIFEST.in Remove impacket and pywinrm thirdparty 2020-01-24 03:40:02 -05:00
Makefile Added WINRM support, NMap XML and .Nessus parsing 2017-10-24 20:08:19 -06:00
Pipfile Switch pywinrm thirdparty to pip 2020-02-15 06:01:14 -05:00
Pipfile.lock Fix Pipfile python version and submodile version 2020-01-16 04:34:21 -05:00
README.md Migrate function to python3 2019-11-11 05:06:39 -05:00
README.rst Added README.rst 2017-10-21 20:36:34 -06:00
requirements.txt Upgrade pylnk3 to version 0.3 2020-02-17 02:44:40 -05:00
setup.cfg Added README.rst 2017-10-21 20:36:34 -06:00
setup.py Switch pywinrm thirdparty to pip 2020-02-15 06:01:14 -05:00

README.md

Supported Python versions

CrackMapExec

cme

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here.

How to fund my tea & sushi reserve

BTC: 1ER8rRE6NTZ7RHN88zc6JY87LvtyuRUJGU

ETH: 0x91d9aDCf8B91f55BCBF0841616A01BeE551E90ee

LTC: LLMa2bsvXbgBGnnBwiXYazsj7Uz6zRe4fr

To do

  • Kerberos support
  • 0wn everything