You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The `htafile` method uses the exposed HTML Application object to call [`IPersistMoniker.Load`](https://learn.microsoft.com/en-us/previous-versions/aa458529(v=msdn.10)) with a client-supplied [URL moniker](https://learn.microsoft.com/en-us/openspecs/office_file_formats/ms-oshared/4948a119-c4e4-46b6-9609-0525118552e8). The URL can point to a URL of any format supported by `mshta.exe`.
341
+
342
+
```text
343
+
Usage:
344
+
goexec dcom htafile [target] [flags]
345
+
346
+
Execution:
347
+
-U, --url URL Load custom URL
348
+
--js string Execute JavaScript one-liner
349
+
--vbs string Execute VBScript one-liner
350
+
-e, --exec executable Remote Windows executable to invoke
351
+
-a, --args string Process command line arguments
352
+
-c, --command string Windows process command line (executable & arguments)
353
+
-o, --out file Fetch execution output to file or "-" for standard output
354
+
-m, --out-method string Method to fetch execution output (default "smb")
The `tsch` module makes use of the Windows Task Scheduler service ([MS-TSCH](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/)) to spawn processes on the remote target.
0 commit comments