Metadata-Version: 2.4
Name: Devious-WinRM
Version: 1.2.2
Summary: A Pentester's Powershell Client.
Author-email: Pablo Comino <pablo@pablocomino.com>
Requires-Python: >=3.11
Description-Content-Type: text/markdown
License-File: LICENSE
License-File: NOTICE
Requires-Dist: prompt_toolkit>=3.0.5
Requires-Dist: impacket==0.13.0
Requires-Dist: Pygments>=2.19.1
Requires-Dist: rich>=14.0.0
Requires-Dist: typer>=0.16.0
Requires-Dist: devious-pypsrp[kerberos]
Dynamic: license-file

# Devious-WinRM

A Pentester's Powershell Client.

![The help screen for Devious-WinRM, showing a variety of flags and options.](https://raw.githubusercontent.com/1upbyte/Devious-WinRM/refs/heads/main/assets/help-screen.png "Help screen")


## Highlight Features
### Zero-confing Kerberos
Devious-WinRM's initial reason for creation was due to how complicated Kerberos auth can be. With Devious-WinRM, on most operating systems, it is as simple as appending the `-k` flag to the command line. Devious-WinRM will automatically handle the rest.

### Easy in-memory .NET execution
Any .NET binary can be ran directly in the Powershell process' memory using the [invoke](https://github.com/1upbyte/Devious-WinRM/wiki/2-%E2%80%90-Usage-Guide#invoke) command, usually **bypassing AV detection**. It's quick-and-easy way to covertly execute binaries without touching disk.

### Local token upgrader
Some commands, such as `Get-Service` or `qwinsta` will fail to execute via WinRM due to a permission error. Devious-WinRM leverages RunasCs for an effortless way to get around this limitation of WinRM. Simply prepending the desired command with [localexec](https://github.com/1upbyte/Devious-WinRM/wiki/2-%E2%80%90-Usage-Guide#localexec) will work.

## Installation
Check out the [Installation Guide](https://github.com/1upbyte/Devious-WinRM/wiki/Installation-Guide) for instructions.
TLDR: `uv tool install devious-winrm`

## Wiki
The [Usage Guide](https://github.com/1upbyte/Devious-WinRM/wiki/2-%E2%80%90-Usage-Guide) has extensive documentation on every single feature and command.

## Star History

[![Star History Chart](https://api.star-history.com/svg?repos=1upbyte/devious-winrm&type=date&legend=top-left)](https://www.star-history.com/#1upbyte/devious-winrm&type=date&legend=top-left)

## Credits
- [Evil-WinRM](https://github.com/Hackplayers/evil-winrm)  - This goes without saying, but Evil-WinRM is an incredible tool. It was the primary inspiration for this project.
- [pypsrp](https://github.com/jborean93/pypsrp) - A tremendously well-featured library for Powershell Remote in Python. Super friendly developer as well!
- [evil-winrm-py](https://github.com/adityatelange/evil-winrm-py) - Aditya and I had the same idea at almost the exact same time. I would be remissed if I didn't mention his project as well.
- [RunasCs](https://github.com/antonioCoco/RunasCs) - Used for the local token upgrader. Super useful tool when doing work over WinRM.
