The Network Execution Tool
 
 
 
Go to file
François REYNAUD 6d4731cf93 Merge branch 'master' of https://github.com/mpgn/CrackMapExec 2023-07-21 17:03:33 +02:00
.github Fix py version 2023-07-15 12:08:46 +02:00
cme Merge branch 'master' of https://github.com/mpgn/CrackMapExec 2023-07-21 17:03:33 +02:00
tests fix bug where socket would not exist and updated ftp/ssh-related tests to include file creds 2023-06-18 10:09:01 -04:00
.dockerignore Fix for Docker Build 2020-09-20 09:23:16 -06:00
.gitignore chore(gitignore): add .idea to gitignore 2023-03-13 15:55:46 -04:00
.gitlab-ci.yml Update .gitlab-ci.yml 2021-11-18 15:39:44 +00:00
.gitmodules Cleanup cme 2022-06-20 07:53:30 -04:00
Dockerfile Fix #686 2022-12-12 14:39:29 -05:00
LICENSE change URL to porchetta industries github 2022-07-03 14:15:44 -04:00
Makefile Bye Bye thirdparty folder 👋 #361 2021-02-28 09:00:12 -05:00
README.md Update README.md 2023-06-26 23:21:48 +02:00
build_collector.py Merge in next release code 2023-06-09 11:03:45 +02:00
crackmapexec.spec Fix #475 #456 thanks @Qazeer 2021-10-16 16:22:37 -04:00
flake.lock Add Nix Flake support 2022-04-29 16:35:48 +00:00
flake.nix Finish updating Nix support 2022-04-29 16:57:49 +00:00
poetry.lock Increase ulimit to prevent error "Too many open files" 2023-07-05 05:57:21 -04:00
pyproject.toml Bump version 2023-07-14 01:24:38 +02:00
requirements.txt add equirements.txt 2023-06-26 17:55:21 -04:00
shell.nix Add Nix Shell support 2022-04-29 16:36:28 +00:00

README.md

Supported Python versions Twitter Twitter

🚩 This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/

CrackMapExec

cme

In partnership with

🚩 Sponsors

If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/

Official Discord Channel

Come hang out on Discord!

Porchetta Industries

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation on the GitBook

Code Contributors

Awesome code contributors of CME:

To do

  • 0wn everything