https://github.com/daschr/remsess_inject
Injects powershell commands into all running sessions (explorer.exe) of the current user.
https://github.com/daschr/remsess_inject
malware powershell windows
Last synced: about 1 year ago
JSON representation
Injects powershell commands into all running sessions (explorer.exe) of the current user.
- Host: GitHub
- URL: https://github.com/daschr/remsess_inject
- Owner: daschr
- License: mit
- Created: 2024-05-21T15:49:09.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2024-09-02T10:26:56.000Z (over 1 year ago)
- Last Synced: 2025-02-03T06:32:45.683Z (about 1 year ago)
- Topics: malware, powershell, windows
- Language: Rust
- Homepage:
- Size: 15.6 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
**DISCLAIMER**: I am not responsible for any type of damage caused by the use of this software in this repository.
# Why?
Because it is pain to alter a users current RDP session from the outside of it.
# Usage
f.e `.\injector.exe "net use * \\192.168.1.1\Share1 s3cr3t /user:share1"`
# EDR flags it as malicious
That's right, because it does DLL injection. I will not give hints how to prevent it.