The Network Execution Tool
 
 
 
Go to file
byt3bl33d3r 651c181c83 smbexec and wmiexec now will start an SMB server and use it to read command output if unable to retrieve output from disk
changed default method of execution to smbexec
Fixed bug where an unexpected exit would occur if specifying only one target with --mimikatz
2015-08-17 18:40:10 +02:00
.gitignore Added upload, download and delete commands 2015-08-15 22:48:54 +02:00
Invoke-Mimikatz.ps1 initial commit 2015-08-14 16:19:16 +02:00
LICENSE Initial commit 2015-08-14 16:11:55 +02:00
README.md Greenlet Output is now partially synced between threads 2015-08-15 15:32:57 +02:00
crackmapexec.py smbexec and wmiexec now will start an SMB server and use it to read command output if unable to retrieve output from disk 2015-08-17 18:40:10 +02:00
requirements.txt Added list command 2015-08-15 23:40:22 +02:00

README.md

CrackMapExec

A swiss army knife for pentesting Windows/Active Directory environments