%global _empty_manifest_terminate_build 0
Name: python-crackmapexec
Version: 5.2.3
Release: 1
Summary: A swiss army knife for pentesting networks
License: BSD-2-Clause
URL: https://github.com/byt3bl33d3r/CrackMapExec
Source0: https://mirrors.nju.edu.cn/pypi/web/packages/f1/28/397ca809ab8efc3307fdca499f5118483b70957893c1ad79e86bedc47811/crackmapexec-5.2.3.tar.gz
BuildArch: noarch
Requires: python3-requests
Requires: python3-requests-ntlm
Requires: python3-bs4
Requires: python3-lsassy
Requires: python3-termcolor
Requires: python3-msgpack
Requires: python3-neo4j
Requires: python3-pylnk3
Requires: python3-pypsrp
Requires: python3-paramiko
Requires: python3-impacket
Requires: python3-xmltodict
Requires: python3-terminaltables
Requires: python3-aioconsole
Requires: python3-pywerview
%description
![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
# CrackMapExec
## In partnership with
![](https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png)
## :triangular_flag_on_post: Sponsors
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
## Official Discord Channel
Come hang out on Discord!
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
# Acknowledgments
**(These are the people who did the hard stuff)**
This project was originally inspired by:
- [CredCrack](https://github.com/gojhonny/CredCrack)
- [smbexec](https://github.com/pentestgeek/smbexec)
- [smbmap](https://github.com/ShawnDEvans/smbmap)
Unintentional contributors:
- The [Empire](https://github.com/PowerShellEmpire/Empire) project
- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
This repository contains the following repositories as submodules:
- [Impacket](https://github.com/CoreSecurity/impacket) ♥️
- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation)
- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc)
- [Mimikittenz](https://github.com/putterpanda/mimikittenz)
- [Mimipenguin](https://github.com/huntergregal/mimipenguin)
- [NetRipper](https://github.com/NytroRST/NetRipper)
- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit)
- [Pypsrp](https://github.com/jborean93/pypsrp)
- [Pywerview](https://github.com/the-useless-one/pywerview)
- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts)
- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking)
- [SessionGopher](https://github.com/fireeye/SessionGopher)
# Documentation, Tutorials, Examples
See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples
# Installation
Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/)
# To do
- ~~0wn everything~~
%package -n python3-crackmapexec
Summary: A swiss army knife for pentesting networks
Provides: python-crackmapexec
BuildRequires: python3-devel
BuildRequires: python3-setuptools
BuildRequires: python3-pip
%description -n python3-crackmapexec
![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
# CrackMapExec
## In partnership with
![](https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png)
## :triangular_flag_on_post: Sponsors
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
## Official Discord Channel
Come hang out on Discord!
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
# Acknowledgments
**(These are the people who did the hard stuff)**
This project was originally inspired by:
- [CredCrack](https://github.com/gojhonny/CredCrack)
- [smbexec](https://github.com/pentestgeek/smbexec)
- [smbmap](https://github.com/ShawnDEvans/smbmap)
Unintentional contributors:
- The [Empire](https://github.com/PowerShellEmpire/Empire) project
- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
This repository contains the following repositories as submodules:
- [Impacket](https://github.com/CoreSecurity/impacket) ♥️
- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation)
- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc)
- [Mimikittenz](https://github.com/putterpanda/mimikittenz)
- [Mimipenguin](https://github.com/huntergregal/mimipenguin)
- [NetRipper](https://github.com/NytroRST/NetRipper)
- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit)
- [Pypsrp](https://github.com/jborean93/pypsrp)
- [Pywerview](https://github.com/the-useless-one/pywerview)
- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts)
- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking)
- [SessionGopher](https://github.com/fireeye/SessionGopher)
# Documentation, Tutorials, Examples
See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples
# Installation
Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/)
# To do
- ~~0wn everything~~
%package help
Summary: Development documents and examples for crackmapexec
Provides: python3-crackmapexec-doc
%description help
![Supported Python versions](https://img.shields.io/badge/python-3.7+-blue.svg) [![Twitter](https://img.shields.io/twitter/follow/byt3bl33d3r?label=byt3bl33d3r&style=social)](https://twitter.com/intent/follow?screen_name=byt3bl33d3r) [![Twitter](https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&style=social)](https://twitter.com/intent/follow?screen_name=mpgn_x64)
:triangular_flag_on_post: This is the public repository of CrackMapExec, for latest version and updates please consider supporting us through https://porchetta.industries/
# CrackMapExec
## In partnership with
![](https://user-images.githubusercontent.com/5151193/99304058-1cef5700-280f-11eb-8642-1f9553808d2d.png)
## :triangular_flag_on_post: Sponsors
If you want to sponsors this project and have the latest updates on CME, latest issues fixed, latest features, please support us on https://porchetta.industries/
## Official Discord Channel
Come hang out on Discord!
[![Porchetta Industries](https://discordapp.com/api/guilds/736724457258745996/widget.png?style=banner3)](https://discord.gg/ycGXUxy)
# Acknowledgments
**(These are the people who did the hard stuff)**
This project was originally inspired by:
- [CredCrack](https://github.com/gojhonny/CredCrack)
- [smbexec](https://github.com/pentestgeek/smbexec)
- [smbmap](https://github.com/ShawnDEvans/smbmap)
Unintentional contributors:
- The [Empire](https://github.com/PowerShellEmpire/Empire) project
- @T-S-A's [smbspider](https://github.com/T-S-A/smbspider) script
- @ConsciousHacker's partial Python port of Invoke-obfuscation from the [GreatSCT](https://github.com/GreatSCT/GreatSCT) project
This repository contains the following repositories as submodules:
- [Impacket](https://github.com/CoreSecurity/impacket) ♥️
- [Invoke-Obfuscation](https://github.com/danielbohannon/Invoke-Obfuscation)
- [Invoke-Vnc](https://github.com/artkond/Invoke-Vnc)
- [Mimikittenz](https://github.com/putterpanda/mimikittenz)
- [Mimipenguin](https://github.com/huntergregal/mimipenguin)
- [NetRipper](https://github.com/NytroRST/NetRipper)
- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit)
- [Pypsrp](https://github.com/jborean93/pypsrp)
- [Pywerview](https://github.com/the-useless-one/pywerview)
- [RandomPS-Scripts](https://github.com/xorrior/RandomPS-Scripts)
- [RID-Hijacking](https://github.com/r4wd3r/RID-Hijacking)
- [SessionGopher](https://github.com/fireeye/SessionGopher)
# Documentation, Tutorials, Examples
See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for documentation and usage examples
# Installation
Please see the installation wiki page [here](https://github.com/byt3bl33d3r/CrackMapExec/wiki/Installation) or the [GitBook](https://mpgn.gitbook.io/crackmapexec/)
# To do
- ~~0wn everything~~
%prep
%autosetup -n crackmapexec-5.2.3
%build
%py3_build
%install
%py3_install
install -d -m755 %{buildroot}/%{_pkgdocdir}
if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
pushd %{buildroot}
if [ -d usr/lib ]; then
find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
fi
if [ -d usr/lib64 ]; then
find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
fi
if [ -d usr/bin ]; then
find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
fi
if [ -d usr/sbin ]; then
find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
fi
touch doclist.lst
if [ -d usr/share/man ]; then
find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
fi
popd
mv %{buildroot}/filelist.lst .
mv %{buildroot}/doclist.lst .
%files -n python3-crackmapexec -f filelist.lst
%dir %{python3_sitelib}/*
%files help -f doclist.lst
%{_docdir}/*
%changelog
* Wed May 10 2023 Python_Bot - 5.2.3-1
- Package Spec generated