In the realm of remote desktop management, evilrdp stands out as a powerful tool designed to provide extended control over RDP connections.
Built on the aardwolf RDP client library, it offers a combination of GUI and command-line functionalities, making it an invaluable asset for both administrators and security professionals.
After installation, evilrdp presents a GUI similar to a standard RDP client alongside an interactive command-line shell. Two sets of commands are available:
mousemove, rightclick, doubleclick, type, typefile, return/enter, invokerun, clipboardset, clipboardsetfile, clipboardget, powershell, and screenshot.pscmdchannel, startpscmd, pscmd, getfile, shell, and socksproxy.To use evilrdp, clone the repository from GitHub and install it using pip:
bashgit clone https://github.com/skelsec/evilrdp.git
pip3 install . evilrdp supports various authentication methods via URL formats, such as Kerberos, NTLM, and plain authentication, allowing for flexible connection setups:
rdp+kerberos-password://TEST\Administrator:Passw0rd!1@win2016ad.test.corp/?dc=10.10.10.2&proxytype=socks5&proxyhost=127.0.0.1&proxyport=1080rdp+ntlm-password://TEST\Administrator:Passw0rd!1@10.10.10.103rdp+ntlm-password://TEST\Administrator:<NThash>@10.10.10.103rdp+plain://Administrator:Passw0rd!1@10.10.10.103evilrdp is a versatile tool that enhances RDP capabilities, offering advanced scripting and automation features.
Its ability to execute commands and manage files remotely makes it a valuable asset for both legitimate system administration and security testing scenarios.
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…