evil-winrm
Windows Remote Management (WinRM) shell for pentesting. Once connected, we get a PowerShell prompt on the target host.
More info →Options (9)
-i, --ipbooleanConnect to a host and start an interactive session
evil-winrm {{[-i|--ip]}} {{ip_address}} {{[-u|--user]}} {{user}} {{[-p|--password]}} {{password}}-u, --userbooleanConnect to a host and start an interactive session
evil-winrm {{[-i|--ip]}} {{ip_address}} {{[-u|--user]}} {{user}} {{[-p|--password]}} {{password}}-p, --passwordbooleanConnect to a host and start an interactive session
evil-winrm {{[-i|--ip]}} {{ip_address}} {{[-u|--user]}} {{user}} {{[-p|--password]}} {{password}}-H, --hashbooleanConnect to a host using pass-the-hash authentication instead of a password
evil-winrm {{[-i|--ip]}} {{ip_address}} {{[-u|--user]}} {{user}} {{[-H|--hash]}} {{nt_hash}}-s, --scriptsbooleanConnect to a host, specifying directories for PowerShell scripts and executables
evil-winrm {{[-i|--ip]}} {{ip_address}} {{[-u|--user]}} {{user}} {{[-p|--password]}} {{password}} {{[-s|--scripts]}} {{path/to/scripts}} {{[-e|--executables]}} {{path/to/executables}}-e, --executablesbooleanConnect to a host, specifying directories for PowerShell scripts and executables
evil-winrm {{[-i|--ip]}} {{ip_address}} {{[-u|--user]}} {{user}} {{[-p|--password]}} {{password}} {{[-s|--scripts]}} {{path/to/scripts}} {{[-e|--executables]}} {{path/to/executables}}-S, --sslbooleanConnect to a host, using SSL
evil-winrm {{[-i|--ip]}} {{ip_address}} {{[-u|--user]}} {{user}} {{[-p|--password]}} {{password}} {{[-S|--ssl]}} {{[-c|--pub-key]}} {{path/to/pubkey}} {{[-k|--priv-key]}} {{path/to/privkey}}-c, --pub-keybooleanConnect to a host, using SSL
evil-winrm {{[-i|--ip]}} {{ip_address}} {{[-u|--user]}} {{user}} {{[-p|--password]}} {{password}} {{[-S|--ssl]}} {{[-c|--pub-key]}} {{path/to/pubkey}} {{[-k|--priv-key]}} {{path/to/privkey}}-k, --priv-keybooleanConnect to a host, using SSL
evil-winrm {{[-i|--ip]}} {{ip_address}} {{[-u|--user]}} {{user}} {{[-p|--password]}} {{password}} {{[-S|--ssl]}} {{[-c|--pub-key]}} {{path/to/pubkey}} {{[-k|--priv-key]}} {{path/to/privkey}}Examples (8)
Connect to a host and start an interactive session
evil-winrm [-i|--ip] ip_address [-u|--user] user [-p|--password] passwordConnect to a host using pass-the-hash authentication instead of a password
evil-winrm [-i|--ip] ip_address [-u|--user] user [-H|--hash] nt_hashConnect to a host, specifying directories for PowerShell scripts and executables
evil-winrm [-i|--ip] ip_address [-u|--user] user [-p|--password] password [-s|--scripts] path/to/scripts [-e|--executables] path/to/executablesConnect to a host, using SSL
evil-winrm [-i|--ip] ip_address [-u|--user] user [-p|--password] password [-S|--ssl] [-c|--pub-key] path/to/pubkey [-k|--priv-key] path/to/privkey[Interactive] Upload a file to the host
upload path/to/local_file path/to/remote_file[Interactive] List all loaded PowerShell functions
menu[Interactive] Load a PowerShell script from the `--scripts` directory
script.ps1[Interactive] Invoke a binary on the host from the `--executables` directory
Invoke-Binary binary.exe