The Network Execution Tool
 
 
 
Go to file
Alex 8c4e20d5d8 Readd bytebleeder and mpgn 2023-09-13 00:15:33 +02:00
.github Delete old issue template 2023-09-01 12:12:29 +02:00
cme Fix for allowing to test multiple users with one password 2023-09-08 21:53:39 +02:00
tests fix bug where socket would not exist and updated ftp/ssh-related tests to include file creds 2023-06-18 10:09:01 -04:00
.dockerignore Fix for Docker Build 2020-09-20 09:23:16 -06:00
.gitignore chore(gitignore): add .idea to gitignore 2023-03-13 15:55:46 -04:00
.gitmodules Cleanup cme 2022-06-20 07:53:30 -04:00
Dockerfile Fix #686 2022-12-12 14:39:29 -05:00
LICENSE Readd bytebleeder and mpgn 2023-09-13 00:15:33 +02:00
Makefile Bye Bye thirdparty folder 👋 #361 2021-02-28 09:00:12 -05:00
README.md Update README 2023-09-08 18:52:16 +02:00
build_collector.py Update build_collector.py (test) 2023-09-03 19:08:36 +02:00
crackmapexec.spec Fix #475 #456 thanks @Qazeer 2021-10-16 16:22:37 -04:00
flake.lock Add Nix Flake support 2022-04-29 16:35:48 +00:00
flake.nix Finish updating Nix support 2022-04-29 16:57:49 +00:00
poetry.lock Temporary fix for #108 until oscrypto releases a new version 2023-08-23 10:41:45 +02:00
pyproject.toml Update cme to 6.1.0 2023-09-03 18:47:53 +02:00
shell.nix Add Nix Shell support 2022-04-29 16:36:28 +00:00

README.md

Supported Python versions Twitter Twitter Twitter Twitter Twitter

🚩 This is the open source repository of CrackMapExec maintained by a community of passionate people

CrackMapExec

cme

This project was initially created in 2015 by @byt3bl33d3r. In 2019 @mpgn_x64 started maintaining the project. Five years and a lot of additions later, he retired from maintaining the project. Like many other contributer we (NeffIsBack, Marshall-Hallenbeck and zblurx) started working on new features, bugfixes and helped maintaining CME. With the end of mpgn's maintainer role, we decided to maintain the project together as an full open source project.

You are on the latest up-to-date repository of the project CrackMapExec ! 🎉

  • 🚧 If you want to report a problem, open un Issue
  • 🔀 If you want to contribute, open a Pull Request
  • 💬 If you want to discuss, open a Discussion

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation instructions on the official wiki

Code Contributors

Awesome code contributors of CME:

To do

  • 0wn everything