Winpayloads

Winpayloads - Python2.7

Undetectable Windows Payload Generation with extras Running on Python2.7

As usual, Don’t upload payloads to any online virus checkers

For Fully Undetectable Payloads please use the stager functionality

Docker!

Normal installation is deprecated, Please use docker now.
docker pull charliedean07/winpayloads:latest
docker run -e LANG=C.UTF-8 --net=host -it charliedean07/winpayloads

Features

  • UACBypass - PowerShellEmpire Copyright (c) 2015, Will Schroeder and Justin Warner. All rights reserved.
  • PowerUp - PowerShellEmpire Copyright (c) 2015, Will Schroeder and Justin Warner. All rights reserved.
  • Invoke-Shellcode Copyright (c) 2012, Matthew Graeber. All rights reserved.
  • Invoke-Mimikatz Copyright (c) 2012, Matthew Graeber. All rights reserved.
  • Invoke-EventVwrBypass Matt Nelson (@enigma0x3)
  • Persistence - Adds payload persistence on reboot
  • Psexec Spray - Spray hashes until successful connection and psexec payload on target
  • Upload to local webserver - Easy deployment
  • Powershell stager - allows invoking payloads in memory & more
  • Anti sandboxing techniques
  • Custom shellcode

Check out the Wiki for installation and more!



Share this post




About

Welcome to Cyber-Security my personal blog to share my knowledge
Cyber Security, Ethical Hacking, Web & Network Auditing, Reverse Engineering and Cryptography
This website don't use analytics tracking and is ads-free. JavaScript is enabled .


Contact

Forum : level23hacktools@0x1


2025 © 0x1 | Cyber Security Consulting - Copyright All Rights Reserved