mirror of
https://github.com/tldr-pages/tldr.git
synced 2025-06-05 11:06:00 +02:00

* pages*: improve wording and list placeholders * clamav: fix verb tenses Co-authored-by: Juri Dispan <juri.dispan@posteo.net> * buzzphrase: use k instead of n for number of phrases Co-authored-by: Juri Dispan <juri.dispan@posteo.net> * adguardhome: use non-default instead of different * adguardhome: use configuration instead of config Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com> * goimports, module: fix list placeholders Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com> * pages*: leave stems and extensions in the same placeholders * pages*: fix list placeholders * pages*: fix list placeholders * pages*: apply suggestions from code review Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com> * qpdf: enclose n with backticks Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com> --------- Co-authored-by: Juri Dispan <juri.dispan@posteo.net> Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com> Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com>
37 lines
1.1 KiB
Markdown
37 lines
1.1 KiB
Markdown
# evil-winrm
|
|
|
|
> Windows Remote Management (WinRM) shell for pentesting.
|
|
> Once connected, we get a PowerShell prompt on the target host.
|
|
> More information: <https://github.com/Hackplayers/evil-winrm>.
|
|
|
|
- Connect to a host:
|
|
|
|
`evil-winrm --ip {{ip}} --user {{user}} --password {{password}}`
|
|
|
|
- Connect to a host, passing the password hash:
|
|
|
|
`evil-winrm --ip {{ip}} --user {{user}} --hash {{nt_hash}}`
|
|
|
|
- Connect to a host, specifying directories for scripts and executables:
|
|
|
|
`evil-winrm --ip {{ip}} --user {{user}} --password {{password}} --scripts {{path/to/scripts}} --executables {{path/to/executables}}`
|
|
|
|
- Connect to a host, using SSL:
|
|
|
|
`evil-winrm --ip {{ip}} --user {{user}} --password {{password}} --ssl --pub-key {{path/to/pubkey}} --priv-key {{path/to/privkey}}`
|
|
|
|
- Upload a file to the host:
|
|
|
|
`PS > upload {{path/to/local/file}} {{path/to/remote/file}}`
|
|
|
|
- List all loaded PowerShell functions:
|
|
|
|
`PS > menu`
|
|
|
|
- Load a PowerShell script from the `--scripts` directory:
|
|
|
|
`PS > {{script.ps1}}`
|
|
|
|
- Invoke a binary on the host from the `--executables` directory:
|
|
|
|
`PS > Invoke-Binary {{binary.exe}}`
|