Winpayloads: Undetectable Windows Payload Generation
- Aryan Ahirwar
- Jan 20, 2016
- 1 min read
Open you kali Linux terminal and type the following command
Git clone https://github.com/Charliedean/Winpayloads.git

Now install the downloaded package using ./setup.sh

After successful installation, open new terminal and type ./Winpayloads.py
Now select your desired option, in my case I am selecting option 2 Windows reverse meterpreter (staged) and press enter. Now enter the port, I am using port 4444 and enter the IP address of your kali Linux

A Terminal open and choose Try UAC Bypass press y, in second option again press y to use shelter.
Now choose an executable file to bind the shellter with any .exe file. Here in my case I am using winrar.exe as a file to bind with shellter.exe
Note: only executable file can be binded.

After giving all the options you will get a confirmation like Injection: verified!

In Next prompt it will ask you Upload to Local Webserver press y

Now send the binded winrar.exe to the victim, as soon as he opens the file a meterpreter session will open
Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“

Comments