Dominate Active Directory with PowerShell.
-
Updated
Nov 28, 2025 - PowerShell
Dominate Active Directory with PowerShell.
Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.
Python port of Snaffler using Impacket
A thin Python wrapper around netexec (nxc) that runs the same target/credential pair across many nxc protocols in a single command, with per-protocol flags, a per-service process timeout, and an optional JSON config file.
Blast credentials across all 10 NetExec protocols in parallel — live hits, auto-skip timeouts, clean summaries. Built for fast iterative pentesting.
nxcspidey is a bash script that uses netexec's share spider feature, but in bulk.
Bash wrapper script to perform timed password sprays using NetExec.
MCP server for NetExec - Network execution tool for penetration testing
NetExec / CrackMapExec module that execute PingCastle on a remote machine.
Automated network enumeration tool for pentesters
🔐⚔️Where hashcat, john, hydra & netexec become one. Built for real engagements — hash cracking, password spraying, pitchfork brute-forcing, JWT attacks. Lockout-aware. Credential-safe. Because great pentesters don't juggle tools, they own the workflow.
Homelab project built by following Enterprise 101 guide. Configured Active Directory, Wazuh (SIEM), MailHog for simulated enterprise defense, and simulation attacks for offense, with troubleshooting and documentation.
NetExec module for collecting 1C Enterprise configuration files from Windows targets via SMB
Add a description, image, and links to the netexec topic page so that developers can more easily learn about it.
To associate your repository with the netexec topic, visit your repo's landing page and select "manage topics."