The Network Execution Tool
 
 
 
Go to file
mpgn b3dd37da8c
Merge pull request #341 from Hackndo/lsassy
Add lsassy module
2020-04-19 20:36:38 +02:00
.github Update FUNDING.yml 2020-02-04 05:04:02 -07:00
cme Add lsassy module 2020-04-19 20:30:35 +02:00
.gitignore Migrate cmedb to python3 2019-11-12 16:39:26 -05:00
.gitmodules Merge pull request #295 from r4wd3r/rid_hijacking 2020-04-19 14:36:47 -03:00
LICENSE Initial commit for v4.0 2016-12-15 00:28:00 -07:00
MANIFEST.in Merge pull request #295 from r4wd3r/rid_hijacking 2020-04-19 14:36:47 -03:00
Makefile Added WINRM support, NMap XML and .Nessus parsing 2017-10-24 20:08:19 -06:00
Pipfile Switch pywinrm thirdparty to pip 2020-02-15 06:01:14 -05:00
Pipfile.lock Fix Pipfile python version and submodile version 2020-01-16 04:34:21 -05:00
README.md Merge pull request #295 from r4wd3r/rid_hijacking 2020-04-19 14:36:47 -03:00
README.rst Add rid_hijack documentation to README 2019-02-24 20:52:44 -05:00
requirements.txt Upgrade pylnk3 to version 0.3 2020-02-17 02:44:40 -05:00
setup.cfg Added README.rst 2017-10-21 20:36:34 -06:00
setup.py Switch pywinrm thirdparty to pip 2020-02-15 06:01:14 -05:00

README.md

Supported Python versions

CrackMapExec

cme

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here.

How to fund my tea & sushi reserve

BTC: 1ER8rRE6NTZ7RHN88zc6JY87LvtyuRUJGU

ETH: 0x91d9aDCf8B91f55BCBF0841616A01BeE551E90ee

LTC: LLMa2bsvXbgBGnnBwiXYazsj7Uz6zRe4fr

To do

  • Kerberos support
  • 0wn everything