ENNAENNA

NetExec vs WinPwn

GitHub Stats

5.5k
Stars
3.7k
697
Forks
542
142
Issues
2
today
Updated
8mo ago
BSD-2-Clause
License
BSD-3-Clause
Python
Language
PowerShell

About NetExec

NetExec (nxc) is the actively maintained successor to CrackMapExec. It's a network service exploitation tool that supports SMB, LDAP, WinRM, SSH, MSSQL, RDP, and more. NetExec automates credential testing, command execution, and enumeration across network services. It's indispensable for Active Directory pentesting - spray credentials, dump SAM/LSA, execute commands, and enumerate shares across hundreds of hosts in seconds.

About WinPwn

WinPwn is an automation framework for Windows internal penetration testing that combines dozens of offensive tools and techniques into a single PowerShell script. It performs automated reconnaissance (AD enumeration, network scanning, share hunting), privilege escalation checks, credential extraction (SAM, LSA, DPAPI, browser passwords), lateral movement, and persistence. WinPwn integrates with tools like Rubeus, SharpHound, Mimikatz, and Seatbelt, downloading and executing them in-memory. It is designed for situations where a tester has initial access to a Windows domain environment and needs rapid comprehensive assessment.

Platform Support

๐Ÿงlinux๐ŸŽmacos
๐ŸชŸwindows

Tags

Shared

active-directory

NetExec only

smbldapwinrmcredential-spray

WinPwn only

windowsautomationinternal-pentestprivilege-escalation