Invoke-WMILM

 by   Cybereason PowerShell Version: Current License: AGPL-3.0

kandi X-RAY | Invoke-WMILM Summary

kandi X-RAY | Invoke-WMILM Summary

Invoke-WMILM is a PowerShell library. Invoke-WMILM has no bugs, it has no vulnerabilities, it has a Strong Copyleft License and it has low support. You can download it from GitHub.

This is a PoC script for various methods to acheive authenticated remote code execution via WMI, without (at least directly) using the Win32_Process class. The type of technique is determined by the "Type" parameter.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              Invoke-WMILM has a low active ecosystem.
              It has 227 star(s) with 64 fork(s). There are 17 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              Invoke-WMILM has no issues reported. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of Invoke-WMILM is current.

            kandi-Quality Quality

              Invoke-WMILM has 0 bugs and 0 code smells.

            kandi-Security Security

              Invoke-WMILM has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              Invoke-WMILM code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              Invoke-WMILM is licensed under the AGPL-3.0 License. This license is Strong Copyleft.
              Strong Copyleft licenses enforce sharing, and you can use them when creating open source projects.

            kandi-Reuse Reuse

              Invoke-WMILM releases are not available. You will need to build from source code and install.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Invoke-WMILM
            Get all kandi verified functions for this library.

            Invoke-WMILM Key Features

            No Key Features are available at this moment for Invoke-WMILM.

            Invoke-WMILM Examples and Code Snippets

            No Code Snippets are available at this moment for Invoke-WMILM.

            Community Discussions

            No Community Discussions are available at this moment for Invoke-WMILM.Refer to stack overflow page for discussions.

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install Invoke-WMILM

            You can download it from GitHub.

            Support

            DerivedProcess - Creates a class deriving from Win32_Process, and calls the Create method of that classService - Creates a service and runs it using WMI. Basically PSEXEC with different network trafficJob - Creates an at.exe style scheduled task to run in 30 seconds. Does not work on Win8+, unless at.exe is enabledTask - Creates an schtasks.exe style scheduled task and runs it. Works only on Win8+Product - Runs an arbitrary MSI file from a given path (given by the Command parameter)Provider - Creates a new provider with the command and arguments as the underlying COM object, and loads it
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/Cybereason/Invoke-WMILM.git

          • CLI

            gh repo clone Cybereason/Invoke-WMILM

          • sshUrl

            git@github.com:Cybereason/Invoke-WMILM.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Consider Popular PowerShell Libraries

            Scoop

            by ScoopInstaller

            scoop

            by lukesampson

            blazor

            by dotnet

            PowerSploit

            by PowerShellMafia

            Try Top Libraries by Cybereason

            Logout4Shell

            by CybereasonJava

            linux_plumber

            by CybereasonPython

            ultima

            by CybereasonPython

            epic-logging

            by CybereasonPython

            keychain-cleaner

            by CybereasonC