In the realm of remote desktop management, evilrdp stands out as a powerful tool designed to provide extended control over RDP connections.
Built on the aardwolf RDP client library, it offers a combination of GUI and command-line functionalities, making it an invaluable asset for both administrators and security professionals.
After installation, evilrdp presents a GUI similar to a standard RDP client alongside an interactive command-line shell. Two sets of commands are available:
mousemove
, rightclick
, doubleclick
, type
, typefile
, return/enter
, invokerun
, clipboardset
, clipboardsetfile
, clipboardget
, powershell
, and screenshot
.pscmdchannel
, startpscmd
, pscmd
, getfile
, shell
, and socksproxy
.To use evilrdp, clone the repository from GitHub and install it using pip:
bashgit clone https://github.com/skelsec/evilrdp.git
pip3 install .
evilrdp supports various authentication methods via URL formats, such as Kerberos, NTLM, and plain authentication, allowing for flexible connection setups:
rdp+kerberos-password://TEST\Administrator:Passw0rd!1@win2016ad.test.corp/?dc=10.10.10.2&proxytype=socks5&proxyhost=127.0.0.1&proxyport=1080
rdp+ntlm-password://TEST\Administrator:Passw0rd!1@10.10.10.103
rdp+ntlm-password://TEST\Administrator:<NThash>@10.10.10.103
rdp+plain://Administrator:Passw0rd!1@10.10.10.103
evilrdp is a versatile tool that enhances RDP capabilities, offering advanced scripting and automation features.
Its ability to execute commands and manage files remotely makes it a valuable asset for both legitimate system administration and security testing scenarios.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…