The Network Execution Tool
 
 
 
Go to file
Marshall Hallenbeck fde187e26e fix(cmedb): update get_computers to always return a list 2023-03-13 16:05:59 -04:00
.github Update crackmapexec.yml 2022-11-08 23:01:05 +01:00
cme fix(cmedb): update get_computers to always return a list 2023-03-13 16:05:59 -04:00
.dockerignore Fix for Docker Build 2020-09-20 09:23:16 -06:00
.gitignore chore(gitignore): add .idea to gitignore 2023-03-13 15:55:46 -04:00
.gitlab-ci.yml Update .gitlab-ci.yml 2021-11-18 15:39:44 +00:00
.gitmodules Cleanup cme 2022-06-20 07:53:30 -04:00
Dockerfile Fix #686 2022-12-12 14:39:29 -05:00
LICENSE change URL to porchetta industries github 2022-07-03 14:15:44 -04:00
Makefile Bye Bye thirdparty folder 👋 #361 2021-02-28 09:00:12 -05:00
README.md [chore] update wiki link 2023-02-12 09:19:34 -05:00
build_collector.py Handle stacktrace with binary launch with wrong python version 2023-01-04 11:48:52 -05:00
crackmapexec.spec Fix #475 #456 thanks @Qazeer 2021-10-16 16:22:37 -04:00
flake.lock Add Nix Flake support 2022-04-29 16:35:48 +00:00
flake.nix Finish updating Nix support 2022-04-29 16:57:49 +00:00
poetry.lock feat(sqlalchemy): change DB connection to sqlalchemy and add it as a dependency 2023-03-13 15:58:36 -04:00
pyproject.toml feat(database): working on making database operations more async, reducing write concurrency issues, and fixing sqlalchemy query formats 2023-03-13 16:05:57 -04:00
shell.nix Add Nix Shell support 2022-04-29 16:36:28 +00:00

README.md

Supported Python versions Twitter Twitter

🚩 This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/

CrackMapExec

cme

In partnership with

🚩 Sponsors

If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/

Official Discord Channel

Come hang out on Discord!

Porchetta Industries

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation on the GitBook

To do

  • 0wn everything