kandi X-RAY | Invoke-WMILM Summary
kandi X-RAY | Invoke-WMILM Summary
Invoke-WMILM is a PowerShell library. Invoke-WMILM has no bugs, it has no vulnerabilities, it has a Strong Copyleft License and it has low support. You can download it from GitHub.
This is a PoC script for various methods to acheive authenticated remote code execution via WMI, without (at least directly) using the Win32_Process class. The type of technique is determined by the "Type" parameter.
This is a PoC script for various methods to acheive authenticated remote code execution via WMI, without (at least directly) using the Win32_Process class. The type of technique is determined by the "Type" parameter.
Support
Quality
Security
License
Reuse
Support
Invoke-WMILM has a low active ecosystem.
It has 227 star(s) with 64 fork(s). There are 17 watchers for this library.
It had no major release in the last 6 months.
Invoke-WMILM has no issues reported. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of Invoke-WMILM is current.
Quality
Invoke-WMILM has 0 bugs and 0 code smells.
Security
Invoke-WMILM has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
Invoke-WMILM code analysis shows 0 unresolved vulnerabilities.
There are 0 security hotspots that need review.
License
Invoke-WMILM is licensed under the AGPL-3.0 License. This license is Strong Copyleft.
Strong Copyleft licenses enforce sharing, and you can use them when creating open source projects.
Reuse
Invoke-WMILM releases are not available. You will need to build from source code and install.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Invoke-WMILM
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Invoke-WMILM
Invoke-WMILM Key Features
No Key Features are available at this moment for Invoke-WMILM.
Invoke-WMILM Examples and Code Snippets
No Code Snippets are available at this moment for Invoke-WMILM.
Community Discussions
No Community Discussions are available at this moment for Invoke-WMILM.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install Invoke-WMILM
You can download it from GitHub.
Support
DerivedProcess - Creates a class deriving from Win32_Process, and calls the Create method of that classService - Creates a service and runs it using WMI. Basically PSEXEC with different network trafficJob - Creates an at.exe style scheduled task to run in 30 seconds. Does not work on Win8+, unless at.exe is enabledTask - Creates an schtasks.exe style scheduled task and runs it. Works only on Win8+Product - Runs an arbitrary MSI file from a given path (given by the Command parameter)Provider - Creates a new provider with the command and arguments as the underlying COM object, and loads it
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page