{
	"id": "70c69a80-f32e-48b1-8a9a-4d3d8fc02952",
	"created_at": "2026-04-06T02:10:58.515364Z",
	"updated_at": "2026-04-10T03:20:58.845379Z",
	"deleted_at": null,
	"sha1_hash": "cf2a2d5644fd4dfe0b9beaeeae2ac98a0d22689b",
	"title": "Run commands on Windows system remotely using Winexe",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 62312,
	"plain_text": "Run commands on Windows system remotely using Winexe\r\nBy Post author:Thanga Prakash\r\nPublished: 2013-06-21 · Archived: 2026-04-06 01:33:10 UTC\r\nwinexe working example\r\nRun commands on Windows system remotely using Winexe:\r\nWinexe is a GNU/Linux-based application that allows users to execute commands remotely on\r\nWindowsNT/2000/XP/2003/Vista/7/8 systems. It installs a service on the remote system, executes the command,\r\nand uninstalls the service. Winexe allows execution of most of the windows shell commands.\r\nHow to install:\r\nYou can download the source package from here [Current version is winexe-1.00.tar.gz]\r\n1. tar -xvf winexe-1.00.tar.gz\r\n2. cd winexe-1.00/source4/\r\n3. ./autogen.sh\r\n4. ./configure\r\n5. make basics bin/winexe\r\n6. make “CPP=gcc -E -ffreestanding” basics bin/winexe (For X64 bit)\r\nthis will create a [ winexe ] binary file in the bin folder. You can use that binary to execute the windows\r\ncommands from Linux.\r\nor else there is some compiled version of the binary itself available for download. You can download and use it\r\nfrom here.\r\nHow to use it:\r\nhttps://web.archive.org/web/20211019012628/https://www.secpod.com/blog/winexe/\r\nPage 1 of 3\n\n./winexe -U [Domain/]User%Password //host command\r\nExamples:\r\n./winexe -U HOME/Administrator%Pass123 //192.168.0.1 “netstat -a”\r\n./winexe -U HOME/Administrator%Pass123 //192.168.0.1 “ipconfig -all”\r\n/winexe -U HOME/Administrator%Pass123 //192.168.0.1 “ping localhost”\r\nTo launch a windows shell from inside your Linux box. Using this below command,\r\n/winexe -U HOME/Administrator%Pass123 //192.168.0.1 “cmd.exe”\r\nWinexe Binarycd winexe-1.00/source4/\r\nhttps://web.archive.org/web/20211019012628/https://www.secpod.com/blog/winexe/\r\nPage 2 of 3\n\nSanerNow Endpoint Management \r\nWith SanerNow Endpoint Management you can run commands and scripts remotely keeping your workforce fully\r\nsecure. Gain complete visibility and control with SanerNow.\r\nSource: https://web.archive.org/web/20211019012628/https://www.secpod.com/blog/winexe/\r\nhttps://web.archive.org/web/20211019012628/https://www.secpod.com/blog/winexe/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://web.archive.org/web/20211019012628/https://www.secpod.com/blog/winexe/"
	],
	"report_names": [
		"winexe"
	],
	"threat_actors": [],
	"ts_created_at": 1775441458,
	"ts_updated_at": 1775791258,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/cf2a2d5644fd4dfe0b9beaeeae2ac98a0d22689b.pdf",
		"text": "https://archive.orkl.eu/cf2a2d5644fd4dfe0b9beaeeae2ac98a0d22689b.txt",
		"img": "https://archive.orkl.eu/cf2a2d5644fd4dfe0b9beaeeae2ac98a0d22689b.jpg"
	}
}