How to Install and Uninstall evil-winrm Package on Kali Linux

Last updated: May 18,2024

1. Install "evil-winrm" package

Please follow the guidelines below to install evil-winrm on Kali Linux

$ sudo apt update $ sudo apt install evil-winrm

2. Uninstall "evil-winrm" package

Please follow the guidance below to uninstall evil-winrm on Kali Linux:

$ sudo apt remove evil-winrm $ sudo apt autoclean && sudo apt autoremove

3. Information about the evil-winrm package on Kali Linux

Package: evil-winrm
Version: 3.5-0kali1
Architecture: all
Maintainer: Kali Developers
Installed-Size: 139
Depends: ruby, ruby-fileutils, ruby-logger, ruby-stringio, ruby-winrm, ruby-winrm-fs
Homepage: https://github.com/Hackplayers/evil-winrm
Priority: optional
Section: ruby
Filename: pool/main/e/evil-winrm/evil-winrm_3.5-0kali1_all.deb
Size: 23436
SHA256: 6a6b53353234846016f87ed0b54a471987c1061c35fb112ec0dd2199b0086b48
SHA1: f6c769a5bbf7f48ae89af250dad5672e7555f969
MD5sum: e080ddb199cc5b5820d16d813bd4f55f
Description: ultimate WinRM shell for hacking/pentesting
This package contains the ultimate WinRM shell for hacking/pentesting.
.
WinRM (Windows Remote Management) is the Microsoft implementation of
WS-Management Protocol. A standard SOAP based protocol that allows hardware
and operating systems from different vendors to interoperate. Microsoft
included it in their Operating Systems in order to make life easier to system
administrators.
.
This program can be used on any Microsoft Windows Servers with this feature
enabled (usually at port 5985), of course only if you have credentials and
permissions to use it. So it could be used in a post-exploitation
hacking/pentesting phase. The purpose of this program is to provide nice and
easy-to-use features for hacking. It can be used with legitimate purposes by
system administrators as well but the most of its features are focused on
hacking/pentesting stuff.
.
It is using PSRP (Powershell Remoting Protocol) for initializing runspace
pools as well as creating and processing pipelines.
Description-md5: