The Network Execution Tool
 
 
 
Go to file
mpgn fea8276480
Update build_collector.py
2020-09-11 22:56:27 +02:00
.github Add new workflow for Github Action 2020-09-11 16:35:55 -04:00
cme Add local-auth flag for MSSQL proto 2020-09-06 15:38:29 -04:00
.dockerignore Added dockerfile 2020-06-29 09:54:00 -06:00
.gitignore Normalize path for pyinstaller linux/windows 2020-05-11 13:48:03 -04:00
.gitmodules dockerhub with pywerview testing 2020-06-30 19:05:54 -04:00
Dockerfile Fixed dockerfile 2020-06-29 10:27:49 -06:00
LICENSE Initial commit for v4.0 2016-12-15 00:28:00 -07:00
MANIFEST.in Merge pull request #295 from r4wd3r/rid_hijacking 2020-04-19 14:36:47 -03:00
Pipfile Update winrm method to allows code execution from normal user 2020-04-28 15:30:18 -04:00
Pipfile.lock Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
README.md Update README.md 2020-07-26 20:07:37 -03:00
build_collector.py Update build_collector.py 2020-09-11 22:56:27 +02:00
crackmapexec.spec Add more compatibility for windows exe 2020-07-30 15:14:31 +02:00
requirements.txt Add module - Set as owned in BloodHound 2020-05-05 09:59:30 +02:00
setup.cfg Fixed dependency hell, added Github actions workflow 2020-04-20 13:19:55 -03:00
setup.py Add new workflow for Github Action 2020-09-11 16:35:55 -04:00

README.md

Supported Python versions

CrackMapExec

cme

Sponsors

Official Discord Channel

Come hang out on Discord!

Porchetta Industries

Acknowledgments

(These are the people who did the hard stuff)

This project was originally inspired by:

Unintentional contributors:

  • The Empire project
  • @T-S-A's smbspider script
  • @ConsciousHacker's partial Python port of Invoke-obfuscation from the GreatSCT project

This repository contains the following repositories as submodules:

Documentation, Tutorials, Examples

See the project's wiki for documentation and usage examples

Installation

Please see the installation wiki page here or the GitBook

To do

  • 0wn everything