In the realm of remote desktop management, evilrdp stands out as a powerful tool designed to provide extended control over RDP connections.
Built on the aardwolf RDP client library, it offers a combination of GUI and command-line functionalities, making it an invaluable asset for both administrators and security professionals.
After installation, evilrdp presents a GUI similar to a standard RDP client alongside an interactive command-line shell. Two sets of commands are available:
mousemove
, rightclick
, doubleclick
, type
, typefile
, return/enter
, invokerun
, clipboardset
, clipboardsetfile
, clipboardget
, powershell
, and screenshot
.pscmdchannel
, startpscmd
, pscmd
, getfile
, shell
, and socksproxy
.To use evilrdp, clone the repository from GitHub and install it using pip:
bashgit clone https://github.com/skelsec/evilrdp.git
pip3 install .
evilrdp supports various authentication methods via URL formats, such as Kerberos, NTLM, and plain authentication, allowing for flexible connection setups:
rdp+kerberos-password://TEST\Administrator:Passw0rd!1@win2016ad.test.corp/?dc=10.10.10.2&proxytype=socks5&proxyhost=127.0.0.1&proxyport=1080
rdp+ntlm-password://TEST\Administrator:Passw0rd!1@10.10.10.103
rdp+ntlm-password://TEST\Administrator:<NThash>@10.10.10.103
rdp+plain://Administrator:Passw0rd!1@10.10.10.103
evilrdp is a versatile tool that enhances RDP capabilities, offering advanced scripting and automation features.
Its ability to execute commands and manage files remotely makes it a valuable asset for both legitimate system administration and security testing scenarios.
SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…