LinuxCommandLibrary
GitHubF-DroidGoogle Play Store

nxc

netExec, a network service exploitation tool

TLDR

SMB authentication check
$ nxc smb [target] -u [user] -p [password]
copy
Enumerate shares
$ nxc smb [target] -u [user] -p [password] --shares
copy
Execute command
$ nxc smb [target] -u [user] -p [password] -x "[command]"
copy
Scan multiple hosts
$ nxc smb [targets.txt] -u [user] -p [password]
copy
Use hash for auth
$ nxc smb [target] -u [user] -H [hash]
copy

SYNOPSIS

nxc [protocol] [target] [options]

DESCRIPTION

nxc (NetExec) is a network service exploitation tool that helps automate assessing the security of large networks. It is the community-maintained successor to CrackMapExec, originally created in 2015.The tool supports multiple protocols including SMB, SSH, LDAP, WinRM, MSSQL, RDP, FTP, and others. It enables credential testing, share enumeration, command execution, and Active Directory operations across networks. Authentication results are color-coded: green for success, red for failure, and magenta for valid credentials that were rejected.

PARAMETERS

PROTOCOL

Protocol module (smb, ssh, ldap, etc.).
TARGET
Target host or file.
-u USER
Username.
-p PASSWORD
Password.
-H HASH
NT hash for pass-the-hash.
--shares
Enumerate shares.
-x COMMAND
Execute command.
--help
Display help information.

CAVEATS

Security tool for authorized penetration testing only. Requires Python and is typically installed via pipx. Successor to CrackMapExec.

HISTORY

NetExec was created as the successor to CrackMapExec for network penetration testing, with community maintenance beginning after the original project was archived.

SEE ALSO

Copied to clipboard
Kai