aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorBryan McNulty <bryanmcnulty@protonmail.com>2025-04-22 15:21:32 -0500
committerBryan McNulty <bryanmcnulty@protonmail.com>2025-04-22 15:21:32 -0500
commitb76db931dc73df38476940d44c7f50e06f298152 (patch)
tree85bc6019ad1861ed15b547c772c5248f8745b07f /README.md
parentecb89c72735ef5ef97e9090c524a0adf1906adf2 (diff)
downloadgoexec-b76db931dc73df38476940d44c7f50e06f298152.tar.gz
goexec-b76db931dc73df38476940d44c7f50e06f298152.zip
Add basic README
Diffstat (limited to 'README.md')
-rw-r--r--README.md51
1 files changed, 45 insertions, 6 deletions
diff --git a/README.md b/README.md
index db68d10..2fa4f01 100644
--- a/README.md
+++ b/README.md
@@ -1,8 +1,47 @@
-# goexec
-Windows remote execution multitool
+# Goexec - Remote Execution Multitool
-## WMI
+Goexec is a new take on some of the methods used to gain remote execution on Windows devices. Goexec implements a number of largely unrealized execution methods and provides significant OPSEC improvements overall.
-### References
-- https://learn.microsoft.com/en-us/windows/win32/wmisdk/wmi-classes
-- https://learn.microsoft.com/en-us/windows/win32/cimwin32prov/create-method-in-class-win32-process \ No newline at end of file
+The original post about Goexec v0.1.0 can be found [here](https://www.falconops.com/blog/introducing-goexec)
+
+## Usage
+
+```text
+Usage:
+ goexec [command] [flags]
+
+Execution Commands:
+ dcom Execute with Distributed Component Object Model (MS-DCOM)
+ wmi Execute with Windows Management Instrumentation (MS-WMI)
+ scmr Execute with Service Control Manager Remote (MS-SCMR)
+ tsch Execute with Windows Task Scheduler (MS-TSCH)
+
+Additional Commands:
+ help Help about any command
+ completion Generate the autocompletion script for the specified shell
+
+Logging:
+ -D, --debug Enable debug logging
+ -O, --log-file file Write JSON logging output to file
+ -j, --json Write logging output in JSON lines
+ -q, --quiet Disable info logging
+
+Authentication:
+ -u, --user user@domain Username ('user@domain', 'domain\user', 'domain/user' or 'user')
+ -p, --password string Password
+ -H, --nt-hash hash NT hash ('NT', ':NT' or 'LM:NT')
+ --aes-key hex key Kerberos AES hex key
+ --pfx file Client certificate and private key as PFX file
+ --pfx-password string Password for PFX file
+ --ccache file Kerberos CCache file name (defaults to $KRB5CCNAME, currently unset)
+ --dc string Domain controller
+ -k, --kerberos Use Kerberos authentication
+
+Use "goexec [command] --help" for more information about a command.
+```
+
+## Acknowledgements
+
+- [@oiweiwei](https://github.com/oiweiwei) for the wonderful [go-msrpc](https://github.com/oiweiwei/go-msrpc) module
+- [@RedTeamPentesting](https://github.com/RedTeamPentesting) and [Erik Geiser](https://github.com/rtpt-erikgeiser) for the [adauth](https://github.com/RedTeamPentesting/adauth) module
+- The developers and contributors of [Impacket](https://github.com/fortra/impacket) for the inspiration and technical reference