https://github.com/MzHmO/psexec_noinstall
Repository contains psexec, which will help to exploit the forgotten pipe
https://github.com/MzHmO/psexec_noinstall
Last synced: 5 months ago
JSON representation
Repository contains psexec, which will help to exploit the forgotten pipe
- Host: GitHub
- URL: https://github.com/MzHmO/psexec_noinstall
- Owner: MzHmO
- Created: 2023-02-20T10:25:29.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2024-11-05T10:50:56.000Z (about 1 year ago)
- Last Synced: 2024-11-21T18:38:56.528Z (about 1 year ago)
- Language: Python
- Homepage:
- Size: 9.77 KB
- Stars: 163
- Watchers: 4
- Forks: 23
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - MzHmO/psexec_noinstall - Repository contains psexec, which will help to exploit the forgotten pipe (Python)
README
# psexec_noinstall
The repository contains psexec, which will help to exploit the forgotten pipe
Have a non-genius administrator connect using PsExec to the host:

We discovered this when we saw the RemCom_Communication bundle. This one is standard for PsExec

Using psexec_noinstall, it is possible to connect to this pipeline as any low-privileged user, since the DACL of the pipeline allows this:


Here's a checker:
https://github.com/beaverdreamer/nxc-modules