summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-05-10 04:53:20 +0000
committerCoprDistGit <infra@openeuler.org>2023-05-10 04:53:20 +0000
commitf20dd2f902f51fc4a48a8847bb3bf4b1ab73b45b (patch)
tree16bd9d86ea573c9a270e75b061950e0e824a5faf
parentcbc5cf3be7a1f8f5cb57d80e653d2bfffecab11c (diff)
automatic import of python-crackmapexecopeneuler20.03
-rw-r--r--.gitignore1
-rw-r--r--python-crackmapexec.spec270
-rw-r--r--sources1
3 files changed, 272 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..a25fce7 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/crackmapexec-5.2.3.tar.gz
diff --git a/python-crackmapexec.spec b/python-crackmapexec.spec
new file mode 100644
index 0000000..358a510
--- /dev/null
+++ b/python-crackmapexec.spec
@@ -0,0 +1,270 @@
+%global _empty_manifest_terminate_build 0
+Name: python-crackmapexec
+Version: 5.2.3
+Release: 1
+Summary: A swiss army knife for pentesting networks
+License: BSD-2-Clause
+URL: https://github.com/byt3bl33d3r/CrackMapExec
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/f1/28/397ca809ab8efc3307fdca499f5118483b70957893c1ad79e86bedc47811/crackmapexec-5.2.3.tar.gz
+BuildArch: noarch
+
+Requires: python3-requests
+Requires: python3-requests-ntlm
+Requires: python3-bs4
+Requires: python3-lsassy
+Requires: python3-termcolor
+Requires: python3-msgpack
+Requires: python3-neo4j
+Requires: python3-pylnk3
+Requires: python3-pypsrp
+Requires: python3-paramiko
+Requires: python3-impacket
+Requires: python3-xmltodict
+Requires: python3-terminaltables
+Requires: python3-aioconsole
+Requires: python3-pywerview
+
+%description
+![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
+
+:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
+
+# CrackMapExec
+
+<p align="center">
+ <img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
+</p>
+
+
+## In partnership with
+
+<p align="center"><img height=150 width=300 src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png"/></p>
+
+## :triangular_flag_on_post: Sponsors
+
+If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
+
+## Official Discord Channel
+
+Come hang out on Discord!
+
+[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
+
+# Acknowledgments
+**(These are the people who did the hard stuff)**
+
+This project was originally inspired by:
+- [CredCrack](https://github.com/gojhonny/CredCrack)
+- [smbexec](https://github.com/pentestgeek/smbexec)
+- [smbmap](https://github.com/ShawnDEvans/smbmap)
+
+Unintentional contributors:
+
+- The [Empire](https://github.com/PowerShellEmpire/Empire) project
+- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
+- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
+
+This repository contains the following repositories as submodules:
+- [Impacket](https://github.com/CoreSecurity/impacket) ♥️
+- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation)
+- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc)
+- [Mimikittenz](https://github.com/putterpanda/mimikittenz)
+- [Mimipenguin](https://github.com/huntergregal/mimipenguin)
+- [NetRipper](https://github.com/NytroRST/NetRipper)
+- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit)
+- [Pypsrp](https://github.com/jborean93/pypsrp)
+- [Pywerview](https://github.com/the-useless-one/pywerview)
+- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts)
+- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking)
+- [SessionGopher](https://github.com/fireeye/SessionGopher)
+
+# Documentation, Tutorials, Examples
+See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples
+
+# Installation
+Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/)
+
+# To do
+- ~~0wn everything~~
+
+
+%package -n python3-crackmapexec
+Summary: A swiss army knife for pentesting networks
+Provides: python-crackmapexec
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-crackmapexec
+![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
+
+:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
+
+# CrackMapExec
+
+<p align="center">
+ <img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
+</p>
+
+
+## In partnership with
+
+<p align="center"><img height=150 width=300 src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png"/></p>
+
+## :triangular_flag_on_post: Sponsors
+
+If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
+
+## Official Discord Channel
+
+Come hang out on Discord!
+
+[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
+
+# Acknowledgments
+**(These are the people who did the hard stuff)**
+
+This project was originally inspired by:
+- [CredCrack](https://github.com/gojhonny/CredCrack)
+- [smbexec](https://github.com/pentestgeek/smbexec)
+- [smbmap](https://github.com/ShawnDEvans/smbmap)
+
+Unintentional contributors:
+
+- The [Empire](https://github.com/PowerShellEmpire/Empire) project
+- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
+- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
+
+This repository contains the following repositories as submodules:
+- [Impacket](https://github.com/CoreSecurity/impacket) ♥️
+- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation)
+- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc)
+- [Mimikittenz](https://github.com/putterpanda/mimikittenz)
+- [Mimipenguin](https://github.com/huntergregal/mimipenguin)
+- [NetRipper](https://github.com/NytroRST/NetRipper)
+- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit)
+- [Pypsrp](https://github.com/jborean93/pypsrp)
+- [Pywerview](https://github.com/the-useless-one/pywerview)
+- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts)
+- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking)
+- [SessionGopher](https://github.com/fireeye/SessionGopher)
+
+# Documentation, Tutorials, Examples
+See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples
+
+# Installation
+Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/)
+
+# To do
+- ~~0wn everything~~
+
+
+%package help
+Summary: Development documents and examples for crackmapexec
+Provides: python3-crackmapexec-doc
+%description help
+![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
+
+:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
+
+# CrackMapExec
+
+<p align="center">
+ <img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/>
+</p>
+
+
+## In partnership with
+
+<p align="center"><img height=150 width=300 src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png"/></p>
+
+## :triangular_flag_on_post: Sponsors
+
+If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
+
+## Official Discord Channel
+
+Come hang out on Discord!
+
+[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
+
+# Acknowledgments
+**(These are the people who did the hard stuff)**
+
+This project was originally inspired by:
+- [CredCrack](https://github.com/gojhonny/CredCrack)
+- [smbexec](https://github.com/pentestgeek/smbexec)
+- [smbmap](https://github.com/ShawnDEvans/smbmap)
+
+Unintentional contributors:
+
+- The [Empire](https://github.com/PowerShellEmpire/Empire) project
+- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
+- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
+
+This repository contains the following repositories as submodules:
+- [Impacket](https://github.com/CoreSecurity/impacket) ♥️
+- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation)
+- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc)
+- [Mimikittenz](https://github.com/putterpanda/mimikittenz)
+- [Mimipenguin](https://github.com/huntergregal/mimipenguin)
+- [NetRipper](https://github.com/NytroRST/NetRipper)
+- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit)
+- [Pypsrp](https://github.com/jborean93/pypsrp)
+- [Pywerview](https://github.com/the-useless-one/pywerview)
+- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts)
+- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking)
+- [SessionGopher](https://github.com/fireeye/SessionGopher)
+
+# Documentation, Tutorials, Examples
+See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples
+
+# Installation
+Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/)
+
+# To do
+- ~~0wn everything~~
+
+
+%prep
+%autosetup -n crackmapexec-5.2.3
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-crackmapexec -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Wed May 10 2023 Python_Bot <Python_Bot@openeuler.org> - 5.2.3-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..4f0a2e2
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+6ffe8db6cc1f1e31812818fd3c244545 crackmapexec-5.2.3.tar.gz