The Network Execution Tool
 
 
 
Go to file
byt3bl33d3r ee36665516 Fixed MSSQL protocol, refactored HTTP Protocol
- Fixed error in MSSQL protocol which would cause it to error out when
executing commands
- Fixed logic to deal with standard MSSQL auth instead of windows auth
- Refactored the HTTP protocol
2017-05-02 18:52:16 -06:00
.github Initial commit for v4.0 2016-12-15 00:28:00 -07:00
cme Fixed MSSQL protocol, refactored HTTP Protocol 2017-05-02 18:52:16 -06:00
.gitignore Initial commit for v4.0 2016-12-15 00:28:00 -07:00
.gitmodules Added CME-Powershell-Scripts submodule 2017-04-30 13:28:09 -06:00
LICENSE Initial commit for v4.0 2016-12-15 00:28:00 -07:00
MANIFEST.in Initial 4.0 pre-release 2017-03-27 15:09:36 -06:00
Makefile Initial commit for v4.0 2016-12-15 00:28:00 -07:00
README.md Update README.md 2017-04-25 16:16:50 -06:00
requirements.txt Re-wrote the HTTP protocol to use splinter and phantomjs 2017-04-30 12:54:35 -06:00
setup.cfg Initial commit for v4.0 2016-12-15 00:28:00 -07:00
setup.py Re-wrote the HTTP protocol to use splinter and phantomjs 2017-04-30 12:54:35 -06:00

README.md

Supported Python versions Arsenal_2016 Arsenal_2017

CrackMapExec

cme

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here.

To do

  • Kerberos support
  • 0wn everything