https://github.com/MzHmO/psexec_noinstall
Repository contains psexec, which will help to exploit the forgotten pipe
https://github.com/MzHmO/psexec_noinstall
Last synced: 5 months ago
JSON representation
Repository contains psexec, which will help to exploit the forgotten pipe
- Host: GitHub
- URL: https://github.com/MzHmO/psexec_noinstall
- Owner: MzHmO
- Created: 2023-02-20T10:25:29.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2023-02-20T10:38:29.000Z (about 2 years ago)
- Last Synced: 2024-10-30T14:12:20.898Z (6 months ago)
- Language: Python
- Homepage:
- Size: 7.81 KB
- Stars: 160
- Watchers: 4
- Forks: 22
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - MzHmO/psexec_noinstall - Repository contains psexec, which will help to exploit the forgotten pipe (Python)
README
# psexec_noinstall
The repository contains psexec, which will help to exploit the forgotten pipeHave a non-genius administrator connect using PsExec to the host:
We discovered this when we saw the RemCom_Communication bundle. This one is standard for PsExec
Using psexec_noinstall, it is possible to connect to this pipeline as any low-privileged user, since the DACL of the pipeline allows this:

Here's a checker:
https://github.com/beaverdreamer/nxc-modules