Metadata-Version: 2.3
Name: crackmapexec
Version: 5.4.0
Summary: A swiss army knife for pentesting networks
Author: Marcello Salvati
Author-email: byt3bl33d3r@pm.com
Requires-Python: >=3.7.0,<4.0.0
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: 3.8
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Programming Language :: Python :: 3.13
Requires-Dist: aardwolf @ git+https://github.com/skelsec/aardwolf.git@main
Requires-Dist: aioconsole (>=0.3.3,<0.4.0)
Requires-Dist: beautifulsoup4 (>=4.11,<5)
Requires-Dist: dsinternals (>=1.2.4,<2.0.0)
Requires-Dist: impacket @ git+https://github.com/SecureAuthCorp/impacket.git@master
Requires-Dist: lsassy (>=3.1.3)
Requires-Dist: masky (>=0.1.1,<0.2.0)
Requires-Dist: minikerberos (==0.3.3)
Requires-Dist: msgpack (>=1.0.0,<2.0.0)
Requires-Dist: neo4j (>=4.1.1,<5.0.0)
Requires-Dist: paramiko (>=2.7.2,<3.0.0)
Requires-Dist: pylnk3 (>=0.4.2,<0.5.0)
Requires-Dist: pypsrp (>=0.7.0,<0.8.0)
Requires-Dist: pywerview (>=0.3.3,<0.4.0)
Requires-Dist: requests (>=2.27.1)
Requires-Dist: termcolor (>=1.1.0,<2.0.0)
Requires-Dist: terminaltables (>=3.1.0,<4.0.0)
Requires-Dist: xmltodict (>=0.12.0,<0.13.0)
Project-URL: Homepage, https://github.com/Porchetta-Industries/CrackMapExec
Project-URL: Repository, https://github.com/Porchetta-Industries/CrackMapExec
Description-Content-Type: text/markdown

![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)

:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/

# CrackMapExec

<p align="center">
  <img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
</p>


## In partnership with

<p float="left">
 <a href="https://www.kali.org/">
  <img src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png" width="300" align="left"/>
 </a>
 
  <a href="https://focal-point.com/services/penetration-testing/">
    <img src="https://user-images.githubusercontent.com/5151193/182207768-f53d7e0e-5bd5-40cf-8734-dfa6a40a738e.png" width="300"/> 
  </a>
</p>

## :triangular_flag_on_post: Sponsors

If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/

## Official Discord Channel

Come hang out on Discord!

[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)

# Acknowledgments
**(These are the people who did the hard stuff)**

This project was originally inspired by:
- [CredCrack](https://github.com/gojhonny/CredCrack)
- [smbexec](https://github.com/pentestgeek/smbexec)
- [smbmap](https://github.com/ShawnDEvans/smbmap)

Unintentional contributors:

- The [Empire](https://github.com/PowerShellEmpire/Empire) project
- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project

# Documentation, Tutorials, Examples
See the project's [wiki](https://mpgn.gitbook.io/crackmapexec/) for documentation and usage examples

# Installation
Please see the installation on the [GitBook](https://mpgn.gitbook.io/crackmapexec/)

# To do
- ~~0wn everything~~

