Can you attack remote PC’s with this or you have to be on the actual clients machine to run this? You would also need to have admin rights I’m assuming.
Good tool, now just trying to see if it can be executed to gain access to a remote pc. I’m the IT guy at work.
Keep up the good work.