11/12 free views
Tool
CLI
Penetration Testing & Red Teaming

NetExec

by Pennyw0rth

5.1Kstars
642forks
39watchers
Updated 3 months ago
About

NetExec is a powerful, community-driven network execution tool for penetration testers and red teamers, designed for efficient post-exploitation and network reconnaissance.

The Network Execution Tool

Primary Use Case

This tool is primarily used by penetration testers and red teamers to automate and streamline tasks within a compromised network. It allows for rapid execution of commands and modules across multiple hosts, aiding in lateral movement, privilege escalation, and data exfiltration during security assessments.

Key Features
  • Network execution across multiple hosts
  • Post-exploitation capabilities
  • Community-driven development and maintenance
  • Supports Python 3.10+
  • Active development with regular updates
  • Forked from CrackMapExec with enhanced features

Installation

  • Ensure pipx is installed: `sudo apt install pipx git`
  • Ensure pipx path is set: `pipx ensurepath`
  • Install NetExec: `pipx install git+https://github.com/Pennyw0rth/NetExec`

Usage

>_ See the project's [wiki](https://netexec.wiki/)

Access documentation, tutorials, and usage examples.

>_ Open an [Issue](https://github.com/Pennyw0rth/NetExec/issues)

Report a problem with the tool.

>_ Open a [Pull Request](https://github.com/Pennyw0rth/NetExec/pulls)

Contribute code or fixes to the project.

>_ Open a [Discussion](https://github.com/Pennyw0rth/NetExec/discussions)

Engage in community discussions about the tool.

Security Frameworks
Execution
Persistence
Privilege Escalation
Discovery
Lateral Movement
Usage Insights
  • Integrate NetExec with Metasploit or other exploitation frameworks to automate multi-stage attacks.
  • Use NetExec’s network monitoring features to simulate adversary lateral movement and improve detection rules.
  • Leverage the community-driven nature to customize and extend modules for environment-specific exploits.
  • Deploy NetExec in purple team exercises to validate detection and response capabilities against real-world offensive techniques.
  • Incorporate NetExec into continuous penetration testing pipelines to provide ongoing security posture assessment.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about NetExec. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team90%
Blue Team30%
Purple Team60%
Details
LicenseBSD 2-Clause "Simplified" License
LanguagePython
Open Issues317
Topics
hacking
pentest
pentest-tool
pentest-tools
pentesting
python
python3
red-team
active-directory
infosec