35+ enumeration modules across SMB, LDAP, MSSQL,
RDP, FTP, and NFS in a single command
A NetExec wrapper that replaces manual nxc commands with a single automated scan -- colored output, intelligent caching, and actionable recommendations.
Users, groups, shares, LAPS, Kerberoastable, delegation, ADCS, gMSA, GPP, PSO, SCCM. Run all at once or pick specific modules.
SMB, LDAP, MSSQL, RDP, FTP, NFS, and VNC in a single scan. Port availability is auto-detected before each module runs.
CIDR ranges, IP ranges, and target files. Parallel host discovery scans /24 networks in seconds with aggregate summary.
Test multiple credentials with -C creds.txt. Visual share access matrix, admin detection, and access comparison.
Findings generate ready-to-run commands with your credentials auto-filled. Priority-ranked with auto-exploit warnings.
Clean line-by-line lists of usernames, SPNs, shares, computers. Pipe directly to other tools or save to files.
Only requires Python 3.10+ and NetExec on your PATH. No pip packages, no virtual environments, no build steps.
Full proxychains/SOCKS support. Auto-reduces concurrency, increases timeouts, skips incompatible modules.
Colored indicators, organized sections, and actionable recommendations -- all from a single command.
Security findings with actionable next steps -- credentials auto-filled from your input.
No pip packages, no build step. Shells out to NetExec for network operations, parses the output, and presents findings with context.
ThreadPoolExecutor runs 36 independent modules with 15 workers. Cache priming runs 7 queries in parallel. Multi-target scans use 5 concurrent workers.
EnumCache stores parsed results from batch LDAP queries. Modules check the cache before making network calls -- 5-10x faster than individual queries.
LDAP queries, SMB enumeration, RPC calls -- never executes commands on targets. Kerberoasting finds SPNs via LDAP only, doesn't request TGS tickets.
Output files created with 0o600 permissions. Debug mode redacts passwords and hashes. Warns on overly permissive credential files.
Clone, install, scan. No Docker, no build step, no config files. Just Python and NetExec.
With no credentials, Maelstrom auto-probes for null sessions, guest access, and LDAP anonymous binds. If any succeed, enumeration continues automatically.
Supports -H for pass-the-hash, -k for Kerberos, --pfx-cert for certificate auth, and -C creds.txt for multi-credential mode with share access matrix.
Target type is auto-detected -- IPs, hostnames, CIDR notation, IP ranges, and target files all work without flags.