This is runas.exe /netonly ..... replacement to provide support to inject password
- Run executable as administrator
Open MalikP.RunAs.exe.config and update key values:
UserNameDomainPasswordCommandUseCustomCommandExecutor[True|False] - optionalCustomCommandExecutorCommandArgument
Or run executable with arguments (order is mandatory):
MalikP.RunAs.exe userName domain password "command"
MalikP.RunAs.exe userName domain password "command" UseCustomCommandExecutor CustomCommandExecutor CommandArgumentMalikP.RunAs.exe userName domain password "command"MalikP.RunAs.exe userName domain password "command" UseCustomCommandExecutor CustomCommandExecutor CommandArgumentExample:
- For powershell
MalikP.RunAs.exe userName domain password "command" True "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-command"- For powershell v.6
MalikP.RunAs.exe userName domain password "command" True "C:\Program Files\PowerShell\6\pwsh.exe" "-NoProfile -Command"- For command prompt
MalikP.RunAs.exe userName domain password "command" True "C:\Windows\System32cmd.exe" "/c"- enccrypt password saved in configuration file