nxc
netExec, a network service exploitation tool
TLDR
SYNOPSIS
nxc [protocol] [target] [options]
DESCRIPTION
nxc (NetExec) is a network service exploitation tool that helps automate assessing the security of large networks. It is the community-maintained successor to CrackMapExec, originally created in 2015.The tool supports multiple protocols including SMB, SSH, LDAP, WinRM, MSSQL, RDP, FTP, and others. It enables credential testing, share enumeration, command execution, and Active Directory operations across networks. Authentication results are color-coded: green for success, red for failure, and magenta for valid credentials that were rejected.
PARAMETERS
PROTOCOL
Protocol module (smb, ssh, ldap, etc.).TARGET
Target host or file.-u USER
Username.-p PASSWORD
Password.-H HASH
NT hash for pass-the-hash.--shares
Enumerate shares.-x COMMAND
Execute command.--help
Display help information.
CAVEATS
Security tool for authorized penetration testing only. Requires Python and is typically installed via pipx. Successor to CrackMapExec.
HISTORY
NetExec was created as the successor to CrackMapExec for network penetration testing, with community maintenance beginning after the original project was archived.
SEE ALSO
nmap(1), crackmapexec(1), hydra(1), impacket(1), metasploit(1)
