Jump to content

AUTOPWN for windows


DLSS
 Share

Recommended Posts

i was doubting if i was going to post this because even tho its similar to autopwn on linux (not the same thing or author) and metasploit, the description isn't exactly whitehat, even tho it can be used for such ...

anyway :

source : http://winautopwn.co.nr/

WINDOWS AUTOPWN (WINAUTOPWN)

Autohack your targets with least possible interaction.

Features :

- Contains already custom-compiled executables of famous and effective exploits alongwith a few original exploits.

- No need to debug, script or compile the source codes.

- Scans all ports 1 - 65535 after taking the IP address and tries all possible exploits according to the list of discovered open ports (OpenPorts.TXT)

- PortScan is multi-threaded.

- Doesn't require any Database at the back-end like msf

- Can be also be used to test effectiveness of IDS/IPS

- Launched exploits are independent and doesn't rely on service fingerprinting (to avoid evasion, if any)

The aim of creating winAUTOPWN is not to compete with already existing commercial frameworks like Core Impact (Pro), Immunity Canvas, Metasploit Framework (freeware), etc. which offer autohacks, but to create a free, quick, standalone application which is easy to use and doesn't require a lot of support of other dependencies.

Also not forgetting that winAUTOPWN unlike other frameworks maintains the original exploit writer's source code intact just as it was and uses it. This way the exploit writer's credit and originality is maintained. The source is modified only when required to enable a missing feature or to remove hard-coded limitations. Under these circumstances also, the exploit writers credits remain intact.

Newer exploit modules are added as and when they release and older ones are also being daily added.

Binaries of perl, php, python and cygwin DLLs (included) are required to exist either in a common folder or should be properly installed with their paths registered for those exploits which are cannot be compiled into a PE-exe.

Some anti-viruses might falsely detect the exploits as malicious.

Future :

- A separate DragonflyBSD-server is being set up which will hold the exploit repository and the next version will autosync the exploits from them in the appropriate folder.

NOTE : In case of emergency, Press "Q" / "q" anytime to EXIT the program.

NOTE : This program winAUTOPWN is released under the WTFPL (http://sam.zoy.org/wtfpl/)

Link to comment
Share on other sites

  • 2 months later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...