evil-winrm
LAZYPARIAH
Our great sponsors
evil-winrm | LAZYPARIAH | |
---|---|---|
4 | 2 | |
4,164 | 140 | |
2.2% | - | |
0.0 | 0.0 | |
13 days ago | almost 2 years ago | |
Ruby | Ruby | |
GNU Lesser General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
evil-winrm
-
HackTheBox - Writeup Authority [Retired]
┌──(root㉿kali)-[/home/kali/hackthebox/machines-windows/authority] └─# evil-winrm -i authority.htb -u svc_ldap -p 'lDaP_1n_th3_cle4r!' Evil-WinRM shell v3.4 Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine Data: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completion Info: Establishing connection to remote endpoint *Evil-WinRM* PS C:\Users\svc_ldap\Documents>
- Release v3.5 · Evil WinRM - This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it.
-
Active Directory in CTFs
Evil-WinRM exploits WinRM, a protocol used by system administrators on Windows servers.
- GitHub - Hackplayers/evil-winrm: The ultimate WinRM shell for hacking/pentesting
LAZYPARIAH
What are some alternatives?
rport - remote access and remote management
black-hat-rust - Applied offensive security with Rust - https://kerkour.com/black-hat-rust
DevChecker - Access remote Windows devices for common IT admin tasks and information
CVE-2021-44228-PoC-log4j-bypass-words - 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
heimdal - Heimdal
mediator - An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.
WhatWeb - Next generation web scanner
envizon - network visualization & pentest reporting
ruby-pwsh - A ruby gem for interacting with PowerShell
ronin-vulns - Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), and Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects.
spellcheck-action - GitHub Action for checking code & Pull Requests for spelling mistakes
reverse-shell-windows - windows 11, 10 reverse shell