View Issue Details

IDProjectCategoryView StatusLast Update
0009210Kali LinuxNew Tool Requestspublic2025-06-06 07:06
Reporterv01dspac3 Assigned To 
PrioritynormalSeverityminorReproducibilityhave not tried
Status newResolutionopen 
Summary0009210: evil-winrm-py - Execute commands interactively on remote Windows machines using the WinRM protocol
Description

[Name] - evil-winrm-py

[Version] - v1.0.0

[Homepage] - https://github.com/adityatelange/evil-winrm-py

[Download] - https://pypi.org/project/evil-winrm-py/

[Author] - Aditya Telange (https://github.com/adityatelange)

[Licence] - MIT License

[Description] - evil-winrm-py is a python-based tool for executing commands on remote Windows machines using the WinRM (Windows Remote Management) protocol. It provides an interactive shell with enhanced features like file upload/download, command history, and colorized output. It supports various authentication methods including NTLM, Pass-the-Hash, Certificate, and Kerberos.

[Dependencies] - "pypsrp==0.8.1","prompt_toolkit==3.0.51","tqdm==4.67.1","pypsrp[kerberos]==0.8.1"

[Similar tools] - evil-winrm

[Activity] - April 2025 - Present

[How to install] - Installation steps: https://github.com/adityatelange/evil-winrm-py?tab=readme-ov-file#install-evil-winrm-py

[How to use] - evil-winrm-py -i 192.168.1.100 -u Administrator -p P@ssw0rd --ssl

[Packaged] - No.

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2025-06-05 16:20 v01dspac3 New Issue