evil-winrm

Windows Remote Management (WinRM) shell for pentesting.
Once connected, we get a PowerShell prompt on the target host.

=> More information.

evil-winrm --ip {ip} --user {user} --password {password}
evil-winrm --ip {ip} --user {user} --hash {nt_hash}
evil-winrm --ip {ip} --user {user} --password {password} --scripts {path/to/scripts} --executables {path/to/executables}
evil-winrm --ip {ip} --user {user} --password {password} --ssl --pub-key {path/to/pubkey} --priv-key {path/to/privkey}
PS > upload {path/to/local/file} {path/to/remote/file}
PS > menu
PS > {script.ps1}
PS > Invoke-Binary {binary.exe}
Copyright © 2014—present the tldr-pages team and contributors.
This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY).

=> CC-BY

Proxy Information
Original URL
gemini://freeshell.de/tldr/evil-winrm.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
104.623471 milliseconds
Gemini-to-HTML Time
0.447213 milliseconds

This content has been proxied by September (ba2dc).