Executes Mimikatz's sekurlsa::logonpasswords on the target system.

Output for each system is stored in $pwd\PME\LogonPasswords\

Supported Methods


  • SMB

  • SessionHunter (WMI)

  • WMI

  • WinRM

Optional Parameters




If specified, PsMapexec will not automatically parse output from all targets systems and identify accounts that belong to privileged groups.



When provided, collected hashes will be compared against an online database https://ntlm.pw



Displays each targets output to the console



Display only successful results


# Standard execution
PsMapExec -Username [User] -Password [Pass] -targets [All] -Module LogonPasswords -Method [Method] -ShowOutput


If -NoParse is not specified, , PsMapExec will parse the results from each system and present the results in a digestable and readable format. The notes field will highlight in yellow any interesting information about each result.

The table below shows the possible values for the notes field.



The parsed account has an AdminCount value of 1. This means the account may hold some sort of privileged access within the domain.

NTLM=Empty Password

The NTLM value is equal to that of an empty password.

Cleartext Password

Cleartext password was parsed from the results. This is only highlited on user accounts and omitted for computer accounts.

Domain Admin Enterprise Admin Server Operator Account Operator

The account is a member of a high value group.

At the end of parsing all unique NTLM hashes will be shown in the console window. A Hashcat ready file will also be populated for collected NTLM hashes in:


Last updated