evil-winrm
命令手册Windows Remote Management (WinRM) shell for pentesting. Once connected, we get a PowerShell prompt on the target host. More information: https://github.com/Hackplayers/evil-winrm.
evil-winrm --ip {{ip}} --user {{user}} --password {{password}}
evil-winrm --ip {{ip}} --user {{user}} --hash {{nt_hash}}
evil-winrm --ip {{ip}} --user {{user}} --password {{password}} --scripts {{path/to/scripts}} --executables {{path/to/executables}}
evil-winrm --ip {{ip}} --user {{user}} --password {{password}} --ssl --pub-key {{path/to/pubkey}} --priv-key {{path/to/privkey}}
PS > upload {{path/to/local/file}} {{path/to/remote/file}}
PS > menu
--scripts
folder:PS > {{script.ps1}}
--executables
folder:PS > Invoke-Binary {{binary.exe}}