Codebase list pywerview / 5678f152-fe4d-468a-a55f-39aa5558f16c/upstream/0.4.0+git20221123.1.89b3e78 setup.py
5678f152-fe4d-468a-a55f-39aa5558f16c/upstream/0.4.0+git20221123.1.89b3e78

Tree @5678f152-fe4d-468a-a55f-39aa5558f16c/upstream/0.4.0+git20221123.1.89b3e78 (Download .tar.gz)

setup.py @5678f152-fe4d-468a-a55f-39aa5558f16c/upstream/0.4.0+git20221123.1.89b3e78raw · history · blame

#!/usr/bin/env python3

from setuptools import setup, find_packages

long_description = open('README.md').read()

setup(name='pywerview',
    version='0.4.0',
    description='A Python port of PowerSploit\'s PowerView',
    long_description=long_description,
    long_description_content_type='text/markdown',
    dependency_links = ['https://github.com/SecureAuthCorp/impacket/tarball/master#egg=impacket-0.9.22'],
    classifiers=[
        'Environment :: Console',
        'License :: OSI Approved :: GNU General Public License v3 or later (GPLv3+)',
        'Programming Language :: Python :: 3.6',
        'Topic :: Security',
    ],
    keywords='python powersploit pentesting recon active directory windows',
    url='https://github.com/the-useless-one/pywerview',
    author='Yannick Méheut',
    author_email='[email protected]',
    license='GNU GPLv3',
    packages=find_packages(include=[
        "pywerview", "pywerview.*"
    ]),
    install_requires=[
        'impacket>=0.9.22',
        'bs4',
        'lxml',
        'pyasn1',
        'ldap3>=2.8.1',
        'gssapi',
        'pycryptodome',
    ],
    entry_points = {
        'console_scripts': ['pywerview=pywerview.cli.main:main'],
    },
    zip_safe=False)