Skip to main content

Execute commands interactively on remote Windows machines using the WinRM protocol

Project description

evil-winrm-py

PyPI version Python License

evil-winrm-py is a python-based tool for executing commands on remote Windows machines using the WinRM (Windows Remote Management) protocol. It provides an interactive shell.

[!NOTE] This tool is designed strictly for educational, ethical use, and authorized penetration testing. Always ensure you have explicit authorization before accessing any system. Unauthorized access or misuse of this tool is both illegal and unethical.

Motivation

The original evil-winrm is written in Ruby, which can be a hurdle for some users. Rewriting it in Python makes it more accessible and easier to use, while also allowing us to leverage Python’s rich ecosystem for added features and flexibility.

I also wanted to learn more about winrm and its internals, so this project will also serve as a learning experience for me.

Features

  • Execute commands on remote Windows machines via an interactive shell.
  • Support for NTLM authentication.
  • Support for Pass-the-Hash authentication.
  • Support for Certificate authentication.
  • Support for Kerberos authentication with SPN (Service Principal Name) prefix and hostname options.
  • Support for SSL to secure communication with the remote host.
  • Support for custom WSMan URIs.
  • Download files from the remote host to the local machine.
  • Upload files from the local machine to the remote host.
  • Auto-complete remote file and directory paths.
  • Enable logging and debugging for better traceability.
  • Navigate command history using up/down arrow keys.
  • Display colorized output for improved readability..
  • Lightweight and Python-based for ease of use.
  • Keyboard Interrupt (Ctrl+C) support to terminate long-running commands gracefully.

Installation (Windows/Linux)

Installation of Kerberos prerequisites on Linux

sudo apt install gcc python3-dev libkrb5-dev
# Optional: krb5-user

Install evil-winrm-py

You may use pipx or uv instead of pip to install evil-winrm-py. pipx/uv is a tool to install and run Python applications in isolated environments, which helps prevent dependency conflicts by keeping the tool's dependencies separate from your system's Python packages.

pip install evil-winrm-py
pip install evil-winrm-py[kerberos] # for kerberos support on Linux

or if you want to install with latest commit from the main branch you can do so by cloning the repository and installing it with pip/pipx/uv:

git clone https://github.com/adityatelange/evil-winrm-py
cd evil-winrm-py
pip install .

Update

pip install --upgrade evil-winrm-py

Uninstall

pip uninstall evil-winrm-py

Usage

usage: evil-winrm-py [-h] -i IP -u USER [-p PASSWORD] [-H HASH] [--no-pass] [-k] [--spn-prefix SPN_PREFIX] [--spn-hostname SPN_HOSTNAME] [--priv-key-pem PRIV_KEY_PEM]
                     [--cert-pem CERT_PEM] [--uri URI] [--ssl] [--port PORT] [--log] [--no-colors] [--version]

options:
  -h, --help            show this help message and exit
  -i IP, --ip IP        remote host IP or hostname
  -u USER, --user USER  username
  -p PASSWORD, --password PASSWORD
                        password
  -H HASH, --hash HASH  nthash
  --no-pass             do not prompt for password
  -k, --kerberos        use kerberos authentication
  --spn-prefix SPN_PREFIX
                        specify spn prefix
  --spn-hostname SPN_HOSTNAME
                        specify spn hostname
  --priv-key-pem PRIV_KEY_PEM
                        local path to private key PEM file
  --cert-pem CERT_PEM   local path to certificate PEM file
  --uri URI             wsman URI (default: /wsman)
  --ssl                 use ssl
  --port PORT           remote host port (default 5985)
  --log                 log session to file
  --no-colors           disable colors
  --version             show version

Example:

evil-winrm-py -i 192.168.1.100 -u Administrator -p P@ssw0rd --ssl

Menu Commands (inside evil-winrm-py shell)

Menu:
[+] upload <local_path> <remote_path>                       - Upload a file
[+] download <remote_path> <local_path>                     - Download a file
[+] menu                                                    - Show this menu
[+] clear, cls                                              - Clear the screen
[+] exit                                                    - Exit the shell
Note: Use absolute paths for upload/download for reliability.

Credits

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

evil_winrm_py-0.0.10.tar.gz (17.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

evil_winrm_py-0.0.10-py3-none-any.whl (16.2 kB view details)

Uploaded Python 3

File details

Details for the file evil_winrm_py-0.0.10.tar.gz.

File metadata

  • Download URL: evil_winrm_py-0.0.10.tar.gz
  • Upload date:
  • Size: 17.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.3

File hashes

Hashes for evil_winrm_py-0.0.10.tar.gz
Algorithm Hash digest
SHA256 2a32f858da12654929409cebe38bf14191ad673f0f87c11ba1e0857e08cf185a
MD5 8695c9e8d01d5784af7244216f9cfd5d
BLAKE2b-256 38eedd967b312712433921d1cb4cbc82d5f6ab9df620b07d645d55b6511e9d5a

See more details on using hashes here.

File details

Details for the file evil_winrm_py-0.0.10-py3-none-any.whl.

File metadata

  • Download URL: evil_winrm_py-0.0.10-py3-none-any.whl
  • Upload date:
  • Size: 16.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.3

File hashes

Hashes for evil_winrm_py-0.0.10-py3-none-any.whl
Algorithm Hash digest
SHA256 5f04c42d1ccf2252acdb25fb7f8323e5c4fd283e8a1bce19b145947964fba515
MD5 5b04be80c2c6ef60a8d739e932686856
BLAKE2b-256 ad87cc56014daa70a7c854c1d4d5e48e41cd6e67c8c154efaa0a58cdf17c3eea

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page