Codebase list pywerview / run/4394be9f-c5d1-4769-839c-d881507939bc/main setup.py
run/4394be9f-c5d1-4769-839c-d881507939bc/main

Tree @run/4394be9f-c5d1-4769-839c-d881507939bc/main (Download .tar.gz)

setup.py @run/4394be9f-c5d1-4769-839c-d881507939bc/mainraw · history · blame

#!/usr/bin/env python3

from setuptools import setup, find_packages

long_description = open('README.md').read()

setup(name='pywerview',
    version='0.4.0',
    description='A Python port of PowerSploit\'s PowerView',
    long_description=long_description,
    long_description_content_type='text/markdown',
    dependency_links = ['https://github.com/SecureAuthCorp/impacket/tarball/master#egg=impacket-0.9.22'],
    classifiers=[
        'Environment :: Console',
        'License :: OSI Approved :: GNU General Public License v3 or later (GPLv3+)',
        'Programming Language :: Python :: 3.6',
        'Topic :: Security',
    ],
    keywords='python powersploit pentesting recon active directory windows',
    url='https://github.com/the-useless-one/pywerview',
    author='Yannick Méheut',
    author_email='[email protected]',
    license='GNU GPLv3',
    packages=find_packages(include=[
        "pywerview", "pywerview.*"
    ]),
    install_requires=[
        'impacket>=0.9.22',
        'bs4',
        'lxml',
        'pyasn1',
        'ldap3>=2.8.1',
        'gssapi',
        'pycryptodome',
    ],
    entry_points = {
        'console_scripts': ['pywerview=pywerview.cli.main:main'],
    },
    zip_safe=False)