diff options
Diffstat (limited to 'python-crackmapexec.spec')
-rw-r--r-- | python-crackmapexec.spec | 270 |
1 files changed, 270 insertions, 0 deletions
diff --git a/python-crackmapexec.spec b/python-crackmapexec.spec new file mode 100644 index 0000000..358a510 --- /dev/null +++ b/python-crackmapexec.spec @@ -0,0 +1,270 @@ +%global _empty_manifest_terminate_build 0 +Name: python-crackmapexec +Version: 5.2.3 +Release: 1 +Summary: A swiss army knife for pentesting networks +License: BSD-2-Clause +URL: https://github.com/byt3bl33d3r/CrackMapExec +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/f1/28/397ca809ab8efc3307fdca499f5118483b70957893c1ad79e86bedc47811/crackmapexec-5.2.3.tar.gz +BuildArch: noarch + +Requires: python3-requests +Requires: python3-requests-ntlm +Requires: python3-bs4 +Requires: python3-lsassy +Requires: python3-termcolor +Requires: python3-msgpack +Requires: python3-neo4j +Requires: python3-pylnk3 +Requires: python3-pypsrp +Requires: python3-paramiko +Requires: python3-impacket +Requires: python3-xmltodict +Requires: python3-terminaltables +Requires: python3-aioconsole +Requires: python3-pywerview + +%description + [](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [](https://twitter.com/intent/follow?screen_name=mpgn_x64) + +:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/ + +# CrackMapExec + +<p align="center"> + <img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/> +</p> + + +## In partnership with + +<p align="center"><img height=150 width=300 src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png"/></p> + +## :triangular_flag_on_post: Sponsors + +If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/ + +## Official Discord Channel + +Come hang out on Discord! + +[](https://discord.gg/ycGXUxy) + +# Acknowledgments +**(These are the people who did the hard stuff)** + +This project was originally inspired by: +- [CredCrack](https://github.com/gojhonny/CredCrack) +- [smbexec](https://github.com/pentestgeek/smbexec) +- [smbmap](https://github.com/ShawnDEvans/smbmap) + +Unintentional contributors: + +- The [Empire](https://github.com/PowerShellEmpire/Empire) project +- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script +- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project + +This repository contains the following repositories as submodules: +- [Impacket](https://github.com/CoreSecurity/impacket) ♥️ +- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation) +- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc) +- [Mimikittenz](https://github.com/putterpanda/mimikittenz) +- [Mimipenguin](https://github.com/huntergregal/mimipenguin) +- [NetRipper](https://github.com/NytroRST/NetRipper) +- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) +- [Pypsrp](https://github.com/jborean93/pypsrp) +- [Pywerview](https://github.com/the-useless-one/pywerview) +- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts) +- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking) +- [SessionGopher](https://github.com/fireeye/SessionGopher) + +# Documentation, Tutorials, Examples +See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples + +# Installation +Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/) + +# To do +- ~~0wn everything~~ + + +%package -n python3-crackmapexec +Summary: A swiss army knife for pentesting networks +Provides: python-crackmapexec +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-crackmapexec + [](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [](https://twitter.com/intent/follow?screen_name=mpgn_x64) + +:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/ + +# CrackMapExec + +<p align="center"> + <img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/> +</p> + + +## In partnership with + +<p align="center"><img height=150 width=300 src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png"/></p> + +## :triangular_flag_on_post: Sponsors + +If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/ + +## Official Discord Channel + +Come hang out on Discord! + +[](https://discord.gg/ycGXUxy) + +# Acknowledgments +**(These are the people who did the hard stuff)** + +This project was originally inspired by: +- [CredCrack](https://github.com/gojhonny/CredCrack) +- [smbexec](https://github.com/pentestgeek/smbexec) +- [smbmap](https://github.com/ShawnDEvans/smbmap) + +Unintentional contributors: + +- The [Empire](https://github.com/PowerShellEmpire/Empire) project +- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script +- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project + +This repository contains the following repositories as submodules: +- [Impacket](https://github.com/CoreSecurity/impacket) ♥️ +- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation) +- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc) +- [Mimikittenz](https://github.com/putterpanda/mimikittenz) +- [Mimipenguin](https://github.com/huntergregal/mimipenguin) +- [NetRipper](https://github.com/NytroRST/NetRipper) +- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) +- [Pypsrp](https://github.com/jborean93/pypsrp) +- [Pywerview](https://github.com/the-useless-one/pywerview) +- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts) +- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking) +- [SessionGopher](https://github.com/fireeye/SessionGopher) + +# Documentation, Tutorials, Examples +See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples + +# Installation +Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/) + +# To do +- ~~0wn everything~~ + + +%package help +Summary: Development documents and examples for crackmapexec +Provides: python3-crackmapexec-doc +%description help + [](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [](https://twitter.com/intent/follow?screen_name=mpgn_x64) + +:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/ + +# CrackMapExec + +<p align="center"> + <img src="https://cloud.githubusercontent.com/assets/5151193/17577511/d312ceb4-5f3b-11e6-8de5-8822246289fd.jpg" alt="cme"/> +</p> + + +## In partnership with + +<p align="center"><img height=150 width=300 src="https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png"/></p> + +## :triangular_flag_on_post: Sponsors + +If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/ + +## Official Discord Channel + +Come hang out on Discord! + +[](https://discord.gg/ycGXUxy) + +# Acknowledgments +**(These are the people who did the hard stuff)** + +This project was originally inspired by: +- [CredCrack](https://github.com/gojhonny/CredCrack) +- [smbexec](https://github.com/pentestgeek/smbexec) +- [smbmap](https://github.com/ShawnDEvans/smbmap) + +Unintentional contributors: + +- The [Empire](https://github.com/PowerShellEmpire/Empire) project +- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script +- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project + +This repository contains the following repositories as submodules: +- [Impacket](https://github.com/CoreSecurity/impacket) ♥️ +- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation) +- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc) +- [Mimikittenz](https://github.com/putterpanda/mimikittenz) +- [Mimipenguin](https://github.com/huntergregal/mimipenguin) +- [NetRipper](https://github.com/NytroRST/NetRipper) +- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) +- [Pypsrp](https://github.com/jborean93/pypsrp) +- [Pywerview](https://github.com/the-useless-one/pywerview) +- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts) +- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking) +- [SessionGopher](https://github.com/fireeye/SessionGopher) + +# Documentation, Tutorials, Examples +See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples + +# Installation +Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/) + +# To do +- ~~0wn everything~~ + + +%prep +%autosetup -n crackmapexec-5.2.3 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-crackmapexec -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Wed May 10 2023 Python_Bot <Python_Bot@openeuler.org> - 5.2.3-1 +- Package Spec generated |