{ "description": "Command exec payload using WMI Win32_Process class\nEvasion technique set to domain check", "template": "templates/payloads/wmi-evasion-template.vba", "varcount": 150, "encodingoffset": 4, "chunksize": 200, "encodedvars": { "DOMAIN":"RINGZER0" }, "vars": [], "evasion": ["encoder", "domain"], "payload": "cmd.exe /c whoami" }