Winpayloads

Winpayloads

Winpayloads - Python2.7

Undetectable Windows Payload Generation with extras Running on Python2.7

As usual, Don’t upload payloads to any online virus checkers

For Fully Undetectable Payloads please use the stager functionality

Docker!

Normal installation is deprecated, Please use docker now.
docker pull charliedean07/winpayloads:latest
docker run -e LANG=C.UTF-8 --net=host -it charliedean07/winpayloads

Features

  • UACBypass - PowerShellEmpire Copyright (c) 2015, Will Schroeder and Justin Warner. All rights reserved.
  • PowerUp - PowerShellEmpire Copyright (c) 2015, Will Schroeder and Justin Warner. All rights reserved.
  • Invoke-Shellcode Copyright (c) 2012, Matthew Graeber. All rights reserved.
  • Invoke-Mimikatz Copyright (c) 2012, Matthew Graeber. All rights reserved.
  • Invoke-EventVwrBypass Matt Nelson (@enigma0x3)
  • Persistence - Adds payload persistence on reboot
  • Psexec Spray - Spray hashes until successful connection and psexec payload on target
  • Upload to local webserver - Easy deployment
  • Powershell stager - allows invoking payloads in memory & more
  • Anti sandboxing techniques
  • Custom shellcode

Check out the Wiki for installation and more!







About

Welcome to 0x1.gitlab.io my personal blog to share my knowledge
Cyber Security, Ethical Hacking, Web & Network Auditing, Reverse Engineering and Cryptography
Website semi-configured to use with No-Script. No ADS and No use analytics tracking.


Contact

Forum : @0x1


© 0x1 | Cyber Security Consulting - Copyright All Rights Reserved