[![pipeline status](https://gitlab.ics.muni.cz/cryton/cryton/badges/master/pipeline.svg)](https://gitlab.ics.muni.cz/cryton/cryton/-/commits/master)
[![coverage report](https://gitlab.ics.muni.cz/cryton/cryton/badges/master/coverage.svg)](https://gitlab.ics.muni.cz/cryton/cryton/-/commits/master)
[![Latest Release](https://gitlab.ics.muni.cz/cryton/cryton/-/badges/release.svg)](https://gitlab.ics.muni.cz/cryton/cryton/-/releases)
[//]: # (TODO: add badges for python versions, black, pylint, flake8, unit tests, integration tests)
# Cryton
Cryton is a Cron-like red team framework for complex attack scenarios automation and scheduling. It provides ways to plan, execute, and evaluate multistep attacks.
**Main features**:
- [Metasploit](https://github.com/rapid7/metasploit-framework) integration
- [Empire](https://github.com/BC-SECURITY/Empire) integration
- Reliable remote execution
- Reproducible scenarios
- Set of modules (Nmap, Medusa, FFUF, ...) with machine-readable output
Cryton is tested and targeted primarily on **Debian** and **Kali Linux**. Please keep in mind that **only
the latest version is supported** and issues regarding different OS or distributions may **not** be resolved.
For more information see the [documentation](https://cryton.gitlab-pages.ics.muni.cz/).
## Quick-start
Please, follow the guide in the [documentation](https://cryton.gitlab-pages.ics.muni.cz/cryton/latest/quick-start/).
## Development
Please, follow the guide in the [documentation](https://cryton.gitlab-pages.ics.muni.cz/cryton/latest/development/).
Raw data
{
"_id": null,
"home_page": "https://gitlab.ics.muni.cz/cryton",
"name": "cryton",
"maintainer": "Ji\u0159\u00ed R\u00e1ja",
"docs_url": null,
"requires_python": "<4.0,>=3.9",
"maintainer_email": "raja@ics.muni.cz",
"keywords": "cryton, hive, advanced, scheduler, cli, client, orchestrator, attacker",
"author": "Ivo Nut\u00e1r",
"author_email": "nutar@ics.muni.cz",
"download_url": "https://files.pythonhosted.org/packages/c1/53/b742dea2b9debcdc871086fc2facd4f741e21207162705bcc9d9e8a6ea1d/cryton-2.1.2.tar.gz",
"platform": null,
"description": "[![pipeline status](https://gitlab.ics.muni.cz/cryton/cryton/badges/master/pipeline.svg)](https://gitlab.ics.muni.cz/cryton/cryton/-/commits/master)\n[![coverage report](https://gitlab.ics.muni.cz/cryton/cryton/badges/master/coverage.svg)](https://gitlab.ics.muni.cz/cryton/cryton/-/commits/master)\n[![Latest Release](https://gitlab.ics.muni.cz/cryton/cryton/-/badges/release.svg)](https://gitlab.ics.muni.cz/cryton/cryton/-/releases)\n\n[//]: # (TODO: add badges for python versions, black, pylint, flake8, unit tests, integration tests)\n\n# Cryton\nCryton is a Cron-like red team framework for complex attack scenarios automation and scheduling. It provides ways to plan, execute, and evaluate multistep attacks.\n\n**Main features**:\n\n- [Metasploit](https://github.com/rapid7/metasploit-framework) integration\n- [Empire](https://github.com/BC-SECURITY/Empire) integration\n- Reliable remote execution\n- Reproducible scenarios\n- Set of modules (Nmap, Medusa, FFUF, ...) with machine-readable output\n\nCryton is tested and targeted primarily on **Debian** and **Kali Linux**. Please keep in mind that **only \nthe latest version is supported** and issues regarding different OS or distributions may **not** be resolved.\n\nFor more information see the [documentation](https://cryton.gitlab-pages.ics.muni.cz/).\n\n## Quick-start\nPlease, follow the guide in the [documentation](https://cryton.gitlab-pages.ics.muni.cz/cryton/latest/quick-start/).\n\n## Development\nPlease, follow the guide in the [documentation](https://cryton.gitlab-pages.ics.muni.cz/cryton/latest/development/).\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "Advanced scenario orchestrator",
"version": "2.1.2",
"project_urls": {
"Documentation": "https://cryton.gitlab-pages.ics.muni.cz/",
"Homepage": "https://gitlab.ics.muni.cz/cryton",
"Repository": "https://gitlab.ics.muni.cz/cryton/cryton"
},
"split_keywords": [
"cryton",
" hive",
" advanced",
" scheduler",
" cli",
" client",
" orchestrator",
" attacker"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "bb584ebf636ba5d923b89ca8b86ca865857efd637d25843f20be6428806c23f9",
"md5": "a5969e9e407833de2ea7eece3764acac",
"sha256": "061021d9d139237979fe80ac0950dff3baf2b67c37e9a4d55dbb805f77c92897"
},
"downloads": -1,
"filename": "cryton-2.1.2-py3-none-any.whl",
"has_sig": false,
"md5_digest": "a5969e9e407833de2ea7eece3764acac",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": "<4.0,>=3.9",
"size": 163333,
"upload_time": "2024-11-18T15:00:53",
"upload_time_iso_8601": "2024-11-18T15:00:53.559392Z",
"url": "https://files.pythonhosted.org/packages/bb/58/4ebf636ba5d923b89ca8b86ca865857efd637d25843f20be6428806c23f9/cryton-2.1.2-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "c153b742dea2b9debcdc871086fc2facd4f741e21207162705bcc9d9e8a6ea1d",
"md5": "25cf112274f19c360ffd4e3b025ee6f7",
"sha256": "6f9cc24eee33c9790b76114ab293fba5778a98d51202ff2ebf8e9f18b0876e80"
},
"downloads": -1,
"filename": "cryton-2.1.2.tar.gz",
"has_sig": false,
"md5_digest": "25cf112274f19c360ffd4e3b025ee6f7",
"packagetype": "sdist",
"python_version": "source",
"requires_python": "<4.0,>=3.9",
"size": 109000,
"upload_time": "2024-11-18T15:00:55",
"upload_time_iso_8601": "2024-11-18T15:00:55.816485Z",
"url": "https://files.pythonhosted.org/packages/c1/53/b742dea2b9debcdc871086fc2facd4f741e21207162705bcc9d9e8a6ea1d/cryton-2.1.2.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-11-18 15:00:55",
"github": false,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"lcname": "cryton"
}