{"id":4587,"date":"2017-06-27T02:42:16","date_gmt":"2017-06-26T18:42:16","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4587"},"modified":"2017-10-29T20:21:12","modified_gmt":"2017-10-29T12:21:12","slug":"winpayloads-undetectable-windows-payload-generation","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/06\/winpayloads-undetectable-windows-payload-generation\/","title":{"rendered":"Winpayloads – Undetectable Windows Payload Generation"},"content":{"rendered":"

Winpayloads is a tool to provide undetectable Windows payload generation with some extras running on Python 2.7.<\/p>\n

\"Winpayloads<\/p>\n

It provides persistence, privilege escalation, shellcode invocation and much more. The tool uses metasploits meterpreter shellcode, injects the users IP and port into the shellcode and writes a python file that executes the shellcode using ctypes. This is then AES encrypted and compiled to a Windows Executable using pyinstaller.<\/p>\n