Devious-WinRM


NameDevious-WinRM JSON
Version 1.0.3 PyPI version JSON
download
home_pageNone
SummaryA Pentester's Powershell Client.
upload_time2025-07-14 05:50:31
maintainerNone
docs_urlNone
authorNone
requires_pythonNone
licenseNone
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # Devious-WinRM

A Pentester's Powershell Client.

![The help screen for Devious-WinRM, showing a variety of flags and options.](https://raw.githubusercontent.com/1upbyte/Devious-WinRM/refs/heads/main/assets/help-screen.png "Help screen")

## Description / Purpose
This tool allows one to access servers running WinRM or Powershell Remoting, with additional tools for capture the flag / pentesting. I created this project to fix a few grievances I have with existing tools (such as the amazing Evil-WinRM) and to contribute to the open-source hacking community.

Under the hood, Devious-WinRM is not directly based on WinRM. It is instead built on the PowerShell Remoting Protocol, which in turn uses WinRM. PSRP was chosen as it seems to require less user permissions than WinRM, at least in a rudementary Active Directory environment.

## Features / Planned
- [x] No-config Kerberos auth
- [x] Make it pretty
- [x] Pass the hash support
- [x] Pass the ticket support
- [x] File upload/download
- [x] Syntax highlighting
- [x] Ctrl+C command interupt
- [x] Remote path completion
- [ ] Certificate auth
- [ ] SSL auth
- [ ] Logging
- [ ] In-Memory .NET/Powershell loader
- [ ] Maybe: Local logon token upgrader via RunasCs 


## Installation
On Linux, Kerberos needs to be installed: `sudo apt install gcc python3-dev libkrb5-dev krb5-pkinit`

The recommended installation method is with [uv](https://github.com/astral-sh/uv). Check out their [docs](https://docs.astral.sh/uv/getting-started/installation/) for how to install it, then run:

`uv tool install devious-winrm --prerelease=allow`

Alternatively, use pipx or pip:

`pipx install devious-winrm`

`pip install devious-winrm`

## Credits
- [Evil-WinRM](https://github.com/Hackplayers/evil-winrm)  - This goes without saying, but Evil-WinRM is an incredible tool. It was the primary inspiration for this project.
- [pypsrp](https://github.com/jborean93/pypsrp) - A tremendously well-featured library for Powershell Remote in Python. Super friendly developer as well!
- [evil-winrm-py](https://github.com/adityatelange/evil-winrm-py) - Aditya and I had the same idea at almost the exact same time. I would be remissed if I didn't mention his project as well.

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "Devious-WinRM",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": null,
    "keywords": null,
    "author": null,
    "author_email": "Pablo Comino <pablo@pablocomino.com>",
    "download_url": "https://files.pythonhosted.org/packages/20/84/bcdba984144132eddc8034f85680a0ffad215ad76b7e5480d0972a05259f/devious_winrm-1.0.3.tar.gz",
    "platform": null,
    "description": "# Devious-WinRM\r\n\r\nA Pentester's Powershell Client.\r\n\r\n![The help screen for Devious-WinRM, showing a variety of flags and options.](https://raw.githubusercontent.com/1upbyte/Devious-WinRM/refs/heads/main/assets/help-screen.png \"Help screen\")\r\n\r\n## Description / Purpose\r\nThis tool allows one to access servers running WinRM or Powershell Remoting, with additional tools for capture the flag / pentesting. I created this project to fix a few grievances I have with existing tools (such as the amazing Evil-WinRM) and to contribute to the open-source hacking community.\r\n\r\nUnder the hood, Devious-WinRM is not directly based on WinRM. It is instead built on the PowerShell Remoting Protocol, which in turn uses WinRM. PSRP was chosen as it seems to require less user permissions than WinRM, at least in a rudementary Active Directory environment.\r\n\r\n## Features / Planned\r\n- [x] No-config Kerberos auth\r\n- [x] Make it pretty\r\n- [x] Pass the hash support\r\n- [x] Pass the ticket support\r\n- [x] File upload/download\r\n- [x] Syntax highlighting\r\n- [x] Ctrl+C command interupt\r\n- [x] Remote path completion\r\n- [ ] Certificate auth\r\n- [ ] SSL auth\r\n- [ ] Logging\r\n- [ ] In-Memory .NET/Powershell loader\r\n- [ ] Maybe: Local logon token upgrader via RunasCs \r\n\r\n\r\n## Installation\r\nOn Linux, Kerberos needs to be installed: `sudo apt install gcc python3-dev libkrb5-dev krb5-pkinit`\r\n\r\nThe recommended installation method is with [uv](https://github.com/astral-sh/uv). Check out their [docs](https://docs.astral.sh/uv/getting-started/installation/) for how to install it, then run:\r\n\r\n`uv tool install devious-winrm --prerelease=allow`\r\n\r\nAlternatively, use pipx or pip:\r\n\r\n`pipx install devious-winrm`\r\n\r\n`pip install devious-winrm`\r\n\r\n## Credits\r\n- [Evil-WinRM](https://github.com/Hackplayers/evil-winrm)  - This goes without saying, but Evil-WinRM is an incredible tool. It was the primary inspiration for this project.\r\n- [pypsrp](https://github.com/jborean93/pypsrp) - A tremendously well-featured library for Powershell Remote in Python. Super friendly developer as well!\r\n- [evil-winrm-py](https://github.com/adityatelange/evil-winrm-py) - Aditya and I had the same idea at almost the exact same time. I would be remissed if I didn't mention his project as well.\r\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "A Pentester's Powershell Client.",
    "version": "1.0.3",
    "project_urls": null,
    "split_keywords": [],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "1beb1cab28c9dc93ee64e6cee218fe46786163be7085766b4124ad42bb0dec8e",
                "md5": "a3a312812b2680178cb7bdc18dba5d79",
                "sha256": "440cefedc270c3f8a9fdee9b27577aed9be93c681fb027cdc15679ef00d3d978"
            },
            "downloads": -1,
            "filename": "devious_winrm-1.0.3-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "a3a312812b2680178cb7bdc18dba5d79",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": null,
            "size": 32368,
            "upload_time": "2025-07-14T05:50:29",
            "upload_time_iso_8601": "2025-07-14T05:50:29.952791Z",
            "url": "https://files.pythonhosted.org/packages/1b/eb/1cab28c9dc93ee64e6cee218fe46786163be7085766b4124ad42bb0dec8e/devious_winrm-1.0.3-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "2084bcdba984144132eddc8034f85680a0ffad215ad76b7e5480d0972a05259f",
                "md5": "2382b6f051fed4b183f863e36e806ab9",
                "sha256": "725b0d7063223a8d1c7693cf8f940ac42a8d9b18fbba3d496726840617e28328"
            },
            "downloads": -1,
            "filename": "devious_winrm-1.0.3.tar.gz",
            "has_sig": false,
            "md5_digest": "2382b6f051fed4b183f863e36e806ab9",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 28309,
            "upload_time": "2025-07-14T05:50:31",
            "upload_time_iso_8601": "2025-07-14T05:50:31.011653Z",
            "url": "https://files.pythonhosted.org/packages/20/84/bcdba984144132eddc8034f85680a0ffad215ad76b7e5480d0972a05259f/devious_winrm-1.0.3.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-07-14 05:50:31",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "devious-winrm"
}
        
Elapsed time: 0.39229s