WMI

MOF

Offensive Lateral Movement

Scorpiones Group | Lateral Movement using DCOM Objects - Guide to using DCOM Objects in order to Move Laterally in the Network.

Shadow Credentials: Abusing Key Trust Account Mapping for Takeover

Inaccessible Systems

GitHub - Hackplayers/evil-winrm: The ultimate WinRM shell for hacking/pentesting