- Joined
- Jan 8, 2019
- Messages
- 56,623
- Solutions
- 2
- Reputation
- 32
- Reaction score
- 100,456
- Points
- 2,313
- Credits
- 32,750
6 Years of Service
76%

Evil-WinRM
This shell is the ultimate WinRM shell for hacking/pentesting.
WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators.
This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff.
Features
Command History
WinRM command completion
Local files completion
Upload and download files
List remote machine services
FullLanguage Powershell language mode
Load Powershell scripts
Load in memory dll files bypassing some AVs
Load in memory C# (C Sharp) compiled exe files bypassing some AVs
Colorization on output messages (can be disabled optionally)
Changelog v3.0
Remote files/directories autocomplete feature (Thanks to arale61)
Added option to log commands and outputs to a log file (Thanks to Borch Cañavate)
To see this hidden content, you must like this content.