This is runas.exe /netonly ..... replacement to provide support to inject password
How to run
- Run executable as administrator
Configuration
Configuration file
Open MalikP.RunAs.exe.config and update key values:
UserNameDomainPasswordCommandUseCustomCommandExecutor[True|False] - optionalCustomCommandExecutorCommandArgument
Or run executable with arguments (order is mandatory):
MalikP.RunAs.exe userName domain password "command"
MalikP.RunAs.exe userName domain password "command" UseCustomCommandExecutor CustomCommandExecutor CommandArgumentExecution using command prompt
MalikP.RunAs.exe userName domain password "command"Execution using powershell or other custom executor
MalikP.RunAs.exe userName domain password "command" UseCustomCommandExecutor CustomCommandExecutor CommandArgumentExample:
- For powershell
MalikP.RunAs.exe userName domain password "command" True "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-command"- For powershell v.6
MalikP.RunAs.exe userName domain password "command" True "C:\Program Files\PowerShell\6\pwsh.exe" "-NoProfile -Command"- For command prompt
MalikP.RunAs.exe userName domain password "command" True "C:\Windows\System32cmd.exe" "/c"Planned
- enccrypt password saved in configuration file

Formed in 2009, the Archive Team (not to be confused with the archive.org Archive-It Team) is a rogue archivist collective dedicated to saving copies of rapidly dying or deleted websites for the sake of history and digital heritage. The group is 100% composed of volunteers and interested parties, and has expanded into a large amount of related projects for saving online and digital history.

