The Network Execution Tool
 
 
 
Go to file
byt3bl33d3r c9cc0c74fa Bumped version number 2020-09-20 08:18:32 -06:00
.github Add new workflow for Github Action 2020-09-11 16:35:55 -04:00
cme Bumped version number 2020-09-20 08:18:32 -06:00
.dockerignore Added dockerfile 2020-06-29 09:54:00 -06:00
.gitignore Normalize path for pyinstaller linux/windows 2020-05-11 13:48:03 -04:00
.gitmodules dockerhub with pywerview testing 2020-06-30 19:05:54 -04:00
Dockerfile Fixed dockerfile 2020-06-29 10:27:49 -06:00
LICENSE Switched from Pipenv to Poetry 2020-09-20 07:59:10 -06:00
Makefile Switched from Pipenv to Poetry 2020-09-20 07:59:10 -06:00
README.md Update README.md 2020-07-26 20:07:37 -03:00
build_collector.py Update build_collector.py 2020-09-11 22:56:27 +02:00
crackmapexec.spec Add more compatibility for windows exe 2020-07-30 15:14:31 +02:00
poetry.lock Switched from Pipenv to Poetry 2020-09-20 07:59:10 -06:00
pyproject.toml Bumped version number 2020-09-20 08:18:32 -06:00
requirements-dev.txt Switched from Pipenv to Poetry 2020-09-20 07:59:10 -06:00
requirements.txt Switched from Pipenv to Poetry 2020-09-20 07:59:10 -06:00

README.md

Supported Python versions

CrackMapExec

cme

Sponsors

Official Discord Channel

Come hang out on Discord!

Porchetta Industries

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here or the GitBook

To do

  • 0wn everything