The Network Execution Tool
 
 
 
Go to file
byt3bl33d3r ee9b6f53d3 Updated README.md 2017-10-25 01:02:55 -06:00
.github Update ISSUE_TEMPLATE.md 2017-10-24 21:10:11 -06:00
cme Fixed Powershell execution using MSSQL 2017-10-25 00:45:58 -06:00
.gitignore Initial commit for v4.0 2016-12-15 00:28:00 -07:00
.gitmodules Added WINRM support, NMap XML and .Nessus parsing 2017-10-24 20:08:19 -06:00
LICENSE Initial commit for v4.0 2016-12-15 00:28:00 -07:00
MANIFEST.in Added README.rst 2017-10-21 20:36:34 -06:00
Makefile Added WINRM support, NMap XML and .Nessus parsing 2017-10-24 20:08:19 -06:00
Pipfile Added WINRM support, NMap XML and .Nessus parsing 2017-10-24 20:08:19 -06:00
Pipfile.lock Added WINRM support, NMap XML and .Nessus parsing 2017-10-24 20:08:19 -06:00
README.md Updated README.md 2017-10-25 01:02:55 -06:00
README.rst Added README.rst 2017-10-21 20:36:34 -06:00
requirements.txt Added WINRM support, NMap XML and .Nessus parsing 2017-10-24 20:08:19 -06:00
setup.cfg Added README.rst 2017-10-21 20:36:34 -06:00
setup.py Added WINRM support, NMap XML and .Nessus parsing 2017-10-24 20:08:19 -06:00

README.md

Supported Python versions Arsenal_2016 Arsenal_2017

CrackMapExec

cme

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here.

To do

  • Kerberos support
  • 0wn everything