The ultimate WinRM shell for hacking/pentesting
-
Updated
Mar 10, 2026 - Ruby
The ultimate WinRM shell for hacking/pentesting
A Pentester's Powershell Client
A PowerShell Remoting client over PSRP and WSMan with raw, struct and auto modes, resilient under JEA and Constrained Language Mode.
Modern WinRM shell for red teams and CTFs with automated tool staging, AV bypass, recon, and credential/loot extraction
MCP server for Evil-WinRM - WinRM shell for Windows penetration testing
Enable the use of the `?` operator as a shorthand for `.unwrap()` on Result and Option types to simplify error handling in Rust code.
Add a description, image, and links to the evil-winrm topic page so that developers can more easily learn about it.
To associate your repository with the evil-winrm topic, visit your repo's landing page and select "manage topics."