WinPayloads – Undetectable Windows Payload Generation – Penetration Testing

Winpaylods is a payload generator tool that uses metasploits meterpreter shellcode, injects the users ip and port into the shellcode and writes a python file that executes the shellcode using ctypes. This is then aes encrypted and compiled to an Windows Executable using pyinstaller.

Features

UACBypass – PowerShellEmpire http://ift.tt/2tdEzle Copyright (c) 2015, Will Schroeder and Justin Warner. All rights reserved.

PowerUp – PowerShellEmpire http://ift.tt/1Pqp4qy Copyright (c) 2015, Will Schroeder and Justin Warner. All rights reserved.

Invoke-Shellcode http://ift.tt/2tdiXWc (c) 2012, Matthew Graeber. All rights reserved.

Invoke-Mimikatz http://ift.tt/2uaSkOU (c) 2012, Matthew Graeber. All rights reserved.

Invoke-EventVwrBypass http://ift.tt/2tdyO72 Nelson (@enigma0x3)

Persistence – Adds payload persistence on reboot

Psexec Spray – Spray hashes until successful connection and psexec payload on target

Upload to local webserver – Easy deployment

Powershell stager – allows invoking payloads in memory & more

Installation

git clone http://ift.tt/2cyYz6W
cd winpayloads
./setup.sh will setup everything needed for Winpayloads
Start Winpayloads ./Winpayloads.py
Type ‘help’ or ‘?’ to get a detailed help page
setup.sh -r will reinstall

Demo

The post WinPayloads – Undetectable Windows Payload Generation appeared first on Penetration Testing.

Anúncios

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s