Windows Remote Management (WinRM) shell for pentesting. Once connected, we get a PowerShell prompt on the target host. More information: https://github.com/Hackplayers/evil-winrm.
evil-winrm --ip ip --user user --password password
evil-winrm --ip ip --user user --hash nt_hash
evil-winrm --ip ip --user user --password password --scripts path/to/scripts --executables path/to/executables
evil-winrm --ip ip --user user --password password --ssl --pub-key path/to/pubkey --priv-key path/to/privkey
PS > upload path/to/local/file path/to/remote/file
PS > menu
--scripts
directory:PS > script.ps1
--executables
directory:PS > Invoke-Binary binary.exe