Evil-Winrm – The Ultimate WinRM Shell For Hacking/Pentesting
Evil-Winrm – The Ultimate WinRM
The ultimate WinRM shell for hacking/pentesting.
Description & Purpose
This shell is also the ultimate WinRM shell for hacking/pentesting.
WinRM (Windows Remote Management) is also the Microsoft implementation of WS-Management Protocol. also A standard SOAP based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system adminsitrators.
This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if
you have credentials and also permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase.
then The purpose of this program is to provide nice and easy-to-use features for hacking. It can also be used with legitimate purposes by
system administrators as well but the most of its features are focused on hacking/pentesting stuff.
Features
Features
- Command History
- WinRM command completion
- Local files completion
- Upload and also download files
- List remote machine services
- FullLanguage Powershell language mode
- 1 Load Powershell scripts
- 2 Load in memory dll files bypassing some AVs
- 3 Load in memory C# (C Sharp) can also compiled exe files bypassing some AVs
- Colorization on output messages (can also be disabled optionally)
Requirements
Ruby 2.3 or higher is needed. Some ruby gems are also needed as well: winrm >=2.3.2, winrm-fs >=1.3.2, stringio >=0.0.2 and colorize >=0.8.1.
Code:
sudo gem install winrm winrm-fs colorize stringio
Installation & Quick Start
Code:
sudo gem install winrm winrm-fs colorize stringio
Installation & Quick Start
- Step 1. Clone the repo:
Code:
git clone https://github.com/Hackplayers/evil-winrm.git - Step 2. Ready. Just launch it!
Code:
cd evil-winrm && ruby evil-winrm.rb -i 192.168.1.100 -u Administrator -p ‘MySuperSecr3tPass123!’ -s ‘/home/foo/ps1_scripts/’ -e ‘/home/foo/exe_files/’
If you don’t want to put the password in clear text, you can also optionally avoid to
set -p argument and the password will be prompted preventing to be shown.
You can also buy instant:
Cashapp Money Transfer Click here
Paypal Money Transfer Click here
Western Union Money Transfer Click here
Venmo Money Transfer Click here
Bank Money Transfer Click here to Contact Us