• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

PsMapExec – PowerShell Command Mapping for Lateral Movement

July 18, 2025

Views: 1,100

Overview

PsMapExec is a PowerShell-native lateral movement utility built for internal penetration testers who need flexibility, speed, and stealth across Windows environments. Created by The-Viper-One, the tool fills a niche similar to Evil-WinRM and Impacket’s psexec.py, but tailored for scripting-friendly workflows and PowerShell-native persistence. If your red team operations lean on WinRM, SMB, or RDP-based access, PsMapExec is a lightweight yet powerful option worth testing against real networks.

PsMapExec - PowerShell Command Mapping for Lateral Movement

Features

PsMapExec allows you to map and execute PowerShell scripts across a list of target IPs. The utility can take a range of credentials, support token impersonation, and execute modules remotely. It includes integrated modules for:

  • SMB enumeration and share mapping
  • WinRM-based command execution
  • Credential spraying support
  • AD user group enumeration

The design is modular and built to allow easy addition of your own PowerShell payloads or operational scripts. This will enable testers to keep their tooling consistent with PowerShell-centric environments, especially when remote C2 channels are limited or heavily monitored.

Use Cases in Internal Engagements

PsMapExec is particularly useful during the lateral movement and privilege escalation stages of a red team or assumed breach assessment. Since many enterprise environments still expose WinRM or SMB internally—with insufficient segmentation—it’s a practical tool to quietly move through the network without deploying external binaries.

It’s also helpful for credential validation. If you’ve harvested credentials during phishing or LSASS dumping and want to verify their scope without alerting EDRs that flag executable-based tooling, PsMapExec gives you a native alternative.

Installation and Usage

The tool comes as a standalone PowerShell script. To run:

Import-Module .\PsMapExec.ps1 Invoke-PsMapExec -TargetList .\targets.txt  -Username "domain\user"  -Password "Password123" ` -Module "smb_enum" 

You can build your modules by following the structure in the Modules\ folder. Module execution results are returned in the console, with verbose output options available for debugging or detailed enumeration.

Detection and Blue Team Considerations

Despite being PowerShell-native, PsMapExec generates observable activity on SMB and WinRM ports (TCP 445 and 5985, respectively). Defenders can spot this through:

  • Windows Event Logs: look for 4688 (process creation) and 4624 (logon events)
  • WinRM logging: track PowerShell Remoting activity and unusual source IPs
  • SMB share access: monitor for high-frequency access patterns or failed attempts

PowerShell logging (module, script block, and transcription) should be enabled where possible to surface unusual module use. Integration with Microsoft Defender’s AMSI or Sysmon with rules targeting lateral toolkits may help spot misuse.

Comparison to Other Tools

Compared to CrackMapExec, PsMapExec is lighter and more focused on PowerShell-native contexts. Unlike Evil-WinRM, it allows parallel execution against multiple hosts with a more modular backend. That makes it especially useful for operators running internal assessments from jump boxes or thin clients where installing full C2 kits isn’t feasible.

However, unlike Cobalt Strike or Havoc, it lacks built-in obfuscation or encryption of traffic, so operational use should assume clear-text visibility unless tunnelled or proxied through existing C2 infrastructure.

Red Team Relevance

For red teams that rely on native tooling and “living off the land” principles, PsMapExec bridges the gap between manual WinRM interaction and full C2 deployment. It is beneficial during “assumed breach” scenarios where you start with domain credentials and limited network access, and need to pivot quickly using low-noise techniques.

It also encourages modularity. Each module is effectively a self-contained PowerShell task, which can be versioned, customised, or integrated with other enumeration pipelines. That fits nicely into a modern, agile red team toolkit.

Final Thoughts

PsMapExec isn’t trying to replace large frameworks. Instead, it offers something highly targeted: a fast, native method to execute tasks across internal Windows machines using just PowerShell and credentials. That simplicity makes it a valuable addition to any red team kit, especially in stealth-heavy or segmented engagements.

You can read more or download it here: https://github.com/The-Viper-One/PsMapExec.

Related Posts:

  • NetExec - Network Execution Toolkit for Windows and…
  • SmbCrawler - SMB Share Discovery and Secret-Hunting
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Dark Web Search Engines in 2025 - Enterprise…
  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • Deepfake-as-a-Service 2025 - How Voice Cloning and…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking Tools Tagged With: powershell



Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 1,822

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 1,725

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,113

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 2,828

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,034

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 922

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,424,339)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,078)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,504)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,309)
  • Password List Download Best Word List – Most Common Passwords (934,597)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,332)
  • Hack Tools/Exploits (674,282)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,367)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy