- WDZWRM Is A LightWeight, Memory-Efficient & Ultra Fast Performing Cli Windows Remote Management Service Bruteforce App.
- Upload/Download File To/From Remote Server Providing Local & Remote File Paths
- Execute Command On Remote Server &OR Save Command Output To File (Default=Prints To Screen)
- Execute Powershell Script Locally Hosted On Your Device On Remote Server
- Can Make New Directory On Remote Server For Remote File To Be Transferred
- Scan Using Password Or Ntlm Hash (32 characters)
- Scan An Entire Network (e.g 1.1.1.0/24)
- Check If Credential(s) Are valid (e.g "server:port@domain\username;password")
- Scan Using "user;password" | "user;ntlm_hash" combo(s) (e.g "admin;admin123", "dev;ab2d4912fc7132fb7165d79cffbc5db5")
- Password Generator (e.g all perms, all upper & lower, all no repeat chars)
- Grab Network Cidr Lists For All Datacenters Or Countries(2 letter cc) (e.g all | microsoft | us)
- No Viruses, Can Be Run Using Guest Or Admin Account On Any Windows OS
- Encrypt/Decrypt Hits With A Password (Can Only Be Decrypted With This Program)
- Clean/Delete All Input Files (Total Stealth)
- Password Protected Program So Even If Found Can't Be Used Without Password
- All In 1 Lightweight Memory Efficient Application At 14 Mb You Can't Find That Anywhere.
- Made By A Pentester For Pentesting &Or Network Administrator Purposes
- Hit Me Up & Let Me Know, Serious Inquiries Only
- Can Be Distributed As An Executable For Windows/Linux Or As A Package To Install With Python On The System.
all
akamai
alibaba
amazon
aws_cloudfront
aws_ec2
aws_s3
bigo
bing
cloudflare
digitalocean
facebook
fastly
github
google
google_cloud
linode
microsoft
netflix
openai
oracle
telegram
twitter
zenlayer
zoom
Scan Servers In 's.txt' For Valid User 'admin' & Password 'admin@123' Using 1000 threads
wrm.exe -s s.txt -u admin -p admin@123 -t 1000
Scan Servers In 's.txt' For Valid User 'admin' & NTLM_Hash '0bae622ab68138248c66d66882818dfd'
wrm.exe -s s.txt -u u.txt -hs 0bae622ab68138248c66d66882818dfd
Scan Servers In 's.txt' For Valid 'User;Password' Combos In 'combo.txt' & Type Password To Encrypt Valid Creds.
wrm.exe -s s.txt -up combo.txt -e
Scan Servers In Network 1.1.1.0/24 For Valid User 'user1' & Generated Password(s), Save Passwords To 'pwd.txt'
wrm.exe -nw 1.1.1.0/24 -u user1 -ps user -pt nrc -pe @123 -po pwd.txt
Save All CIDR Networks For USA In us.txt
wrm.exe -nc US -no us.txt
Scan Servers In 's.txt' For Users In 'u.txt' & Passwords In 'p.txt' & Stealthily Delete All 3 Input Files.
wrm.exe -s s.txt -u u.txt -p p.txt -clean
Execute Command "whoami" On Remote Servers With Valid Creds In 'c.txt' & Save Command Output To "cmd_output.txt" File.
wrm.exe -c c.txt -cmd whoami -co
Upload 'a.txt' Local File & Save As Remote File 'b.txt' On Remote Servers Using Valid Creds In 'c.txt'.
wrm.exe -c c.txt -lf a.txt -rf b.txt -tr
Upload 'a.txt' Local File & Save As Remote File 'C:\Users\User\Documents\Up\b.txt' On Remote Servers Using Valid Creds In 'c.txt' Making New Directory "Up" For Remote File.
wrm.exe -c c.txt -lf a.txt -rf b.txt -tr -md
Download 'b.txt' Remote File From Remote Servers Saved As 'a.txt' Local File Using Valid Creds In 'c.txt'.
wrm.exe -c c.txt -lf a.txt -rf b.txt -dn
Execute Local Powershell Script 'a.ps1' On Remote Servers With Valid Creds In 'c.txt' & Print Output To Screen.
wrm.exe -c c.txt -pss a.ps1
https://mega.nz/file/RG1AXR4K#FuSytedC1m0HxymzDAm1VAVXPH6-O1FXB0nK2kQ1150
- Email: [email protected]
- Github: https://github.com/wuddz-devs
- Telegram: https://t.me/wuddz_devs
- Youtube: https://youtube.com/@wuddz-devs
- Reddit: https://reddit.com/user/wuddz-devs
- ERC20: 0xbF4d5309Bc633d95B6a8fe60E6AF490F11ed2Dd1
- BTC: bc1qa7ssx0e4l6lytqawrnceu6hf5990x4r2uwuead
- LTC: LdbcFiQVUMTfc9eJdc5Gw2nZgyo6WjKCj7
- DOGE: DFwLwtcam7n2JreSpq1r2rtkA48Vos5Hgm
- TRON: TY6e3dWGpqyn2wUgnA5q63c88PJzfDmQAD