The Network Execution Tool
 
 
 
Go to file
mpgn e9a5841731 Fix typo on put-file function 2020-04-28 12:28:25 -04:00
.github Update issue templates for bug report 2020-04-20 20:02:09 +02:00
cme Fix typo on put-file function 2020-04-28 12:28:25 -04:00
.gitignore Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
.gitmodules Merge pull request #295 from r4wd3r/rid_hijacking 2020-04-19 14:36:47 -03:00
LICENSE Initial commit for v4.0 2016-12-15 00:28:00 -07:00
MANIFEST.in Merge pull request #295 from r4wd3r/rid_hijacking 2020-04-19 14:36:47 -03:00
Makefile Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
Pipfile Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
Pipfile.lock Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
README.md Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
requirements.txt Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
setup.cfg Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
setup.py Update shebang of setup.py (#347) 2020-04-20 20:09:24 -03:00

README.md

Supported Python versions

CrackMapExec

cme

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here.

How to fund my tea & sushi reserve

If you use CrackMapExec a lot (especially if it's used commercially), please consider donating as a lot of time & effort went into building & maintaining this.

Press the "Sponsor" button on the top of this page to see ways of donating/sponsoring this project.

To do

  • Kerberos support
  • 0wn everything