{
	"id": "5981351b-9651-479a-b616-975987f2adeb",
	"created_at": "2026-04-06T00:14:53.663846Z",
	"updated_at": "2026-04-10T13:11:22.093558Z",
	"deleted_at": null,
	"sha1_hash": "daaea735da03fa1b0503c107b801958ecf5e2d76",
	"title": "xCmd an Alternative to PsExec",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 56024,
	"plain_text": "xCmd an Alternative to PsExec\r\nPublished: 2011-04-12 · Archived: 2026-04-05 19:15:41 UTC\r\nI recently had to use PsExec for one of my project and it had to integrated into program. I mean invocation of\r\nPsExec had to be done from a coding language. Then i faced problem of application getting hanged. To verify my\r\ncode i did call PsExec from Java, Csharp, VB.net. None of them worked and program hanged on calling PSExec.\r\nThere is a problem with PsExec OutputStream when it is called from a programming language. None of the\r\nversions of PsExec looked good with this bug. So i had tpo find out an alternative,  Here is one good tool named\r\nXCmd by “Zoltan Csizmadia”\r\nExecute Applications on Remote Systems\r\nOverview\r\nThis program allows you to execute applications on remote systems without installing any client software. You\r\ncan start a command prompt or just execute a command or exe  on a remote machine. The only restriction is you\r\nmust be an administrator 😦\r\nEverybody knows the cool tools from Sysinternals (www.sysinternals.com). One of my favorites are PSEXEC,\r\nPSKILL and PSLIST,… 🙂\r\nI was always wonder how they could query every kind of information or execute commands on a remote machine\r\nwithout installing any client software.\r\nFeatures\r\nWith this program you can run as many remote commands on the remote machine as you want.  (PSEXEC\r\nsupports only one remote command on the remote machine at the same time)\r\nYou can execute internal commands (dir,..) directly.\r\nxCmd.exe \\\\remote dir\r\nYou can start a light “telnet” connection with a remote machine without any telnet server\r\nxCmd.exe \\\\remote cmd\r\nUsage\r\nxCmd v1.0 for NT4/2000 – executes commands remotely\r\nFreeware! 2001 Zoltan Csizmadia, zoltan_csizmadia@yahoo.com\r\nUsage: xCmd.exe \\\\computer [options] command/exe arguments\r\nOptions:\r\n/D:directory         Set working directory\r\nDefault: Remote “%SystemRoot%\\System32”\r\nhttps://ashwinrayaprolu.wordpress.com/2011/04/12/xcmd-an-alternative-to-psexec/\r\nPage 1 of 3\n\n/IDLE                Idle priority class\r\n/NORMAL              Normal priority class\r\n/HIGH                High priority class\r\n/REALTIME            Realtime priority class\r\n/C                   Copy the specified program to the remote machine’s\r\n“%SystemRoot%\\System32” directory\r\nCommands’s exe file must be absolute to local machine\r\n/USER:user           User for remote connection\r\n/PWD:{password|*}    Password for remote connection\r\n/NOWAIT              Don’t wait for remote process to terminate\r\nExamples:\r\nxCmd.exe \\\\remote cmd\r\nxCmd.exe \\\\remote /user:administrator dir c:\\ \r\nxCmd.exe \\\\remote /user:somebody /pwd:* /d:d:\\ test1.exe /p1 /p2\r\nxCmd.exe \\\\remote /c /user:somebody /pwd:* /d:d:\\ test2.exe /whatever\r\n– Input is passed to remote machine when you press the ENTER.\r\n– Ctrl-C terminates the remote process\r\n– Command and file path arguments have to be absolute to remote machine\r\nIf you are using /c option, command exe file path must be absolute to\r\nlocal machine, but the arguments must be absolute to remote machine\r\nHow does it work?\r\n1. The xCmd.exe is console application and when you start it, the program will extract a xCmdSvc.exe from\r\nits resources.\r\n2. xCmd.exe creates a service on the remote machine (that’s the reason, you must be an administrator\r\n3. xCmd.exe starts the remote service (#2)\r\n4. xCmd.exe and xCmdSvc.exe will communicate via named pipes\r\n5. xCmd.exe send a packet to the service what to execute\r\n6. xCmdSvc.exe starts the command and redirect stdout, stderr, stdin to 3 named pipes.\r\n7. xCmd.exe listens these 3 named pipes (#6), redirect them to its stdout, stderr, stdin\r\nI have downloaded his code and converted to Visual Studio 2008 Solution and fixed a small bug which comes\r\nwith iostream.h inclusion in new version of C++.\r\nHere is the link to original Article which i copied\r\nhttp://www.codeguru.com/Cpp/I-N/network/remoteinvocation/article.php/c5433\r\nAnd here is modified C++ Solution which gets compiled in Visual Studio. Checkout from svn\r\nhttps://linkwithweb.googlecode.com/svn/trunk/Utilities/RemoteExecution/xCmd\r\nhttps://ashwinrayaprolu.wordpress.com/2011/04/12/xcmd-an-alternative-to-psexec/\r\nPage 2 of 3\n\nSource: https://ashwinrayaprolu.wordpress.com/2011/04/12/xcmd-an-alternative-to-psexec/\r\nhttps://ashwinrayaprolu.wordpress.com/2011/04/12/xcmd-an-alternative-to-psexec/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://ashwinrayaprolu.wordpress.com/2011/04/12/xcmd-an-alternative-to-psexec/"
	],
	"report_names": [
		"xcmd-an-alternative-to-psexec"
	],
	"threat_actors": [],
	"ts_created_at": 1775434493,
	"ts_updated_at": 1775826682,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/daaea735da03fa1b0503c107b801958ecf5e2d76.pdf",
		"text": "https://archive.orkl.eu/daaea735da03fa1b0503c107b801958ecf5e2d76.txt",
		"img": "https://archive.orkl.eu/daaea735da03fa1b0503c107b801958ecf5e2d76.jpg"
	}
}