Evil-WinRM
LGPL-3.0💥 Exploitation · Ruby
Evil-WinRM is a powerful WinRM shell designed for penetration testing and post-exploitation activities. It supports file upload/download, in-memory PowerShell execution, DLL injection, and pass-the-hash authentication. Built in Ruby, this tool provides an effective way to interact with Windows systems remotely, enabling testers to execute commands and scripts without leaving traces on disk, making it a preferred choice for stealthy operations.
Installation
$ gem install evil-winrmTags
Details
- Category
- 💥 Exploitation
- Language
- Ruby
- Repository
- Hackplayers/evil-winrm
- License
- LGPL-3.0
- Platforms
- 🐧linux🍎macos
Links
More in Exploitation
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
BloodHound
GoActive Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
CrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Covenant
C#.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.
Sliver
GoOpen-source C2 framework by BishopFox. mTLS, HTTP(S), DNS, WireGuard implants with multi-operator support.