Most Popular
(5 %) | [CONFIRMED] : WinAutopwn website is infected |
(5 %) | winAUTOPWN v1.9 released |
(5 %) | Windows Autopwn (winAUTOPWN) v2.2 released |
(4 %) | winAUTOPWN v1.7.0 released |
Windows Autopwn (winAUTOPWN) v2.2 released
winAUTOPWN is an auto (hacking) shell gaining tool. It can also be used to test IDS, IPS and other monitoring sensors/softwares.
[CONFIRMED] : WinAutopwn website is infected
We have talked about a cool tool called winAutoPwn. This utility compiles the latest windows "exploits" oriented and perform an aggressive "autoexploitation" attack. But since today and during our "Tools Update Process", we have identified a threat on the website.
winAUTOPWN v1.9 released
The aim of creating winAUTOPWN is not to compete with already existing commercial frameworks like Core Impact (Pro), Immunity Canvas, Metasploit Framework (freeware), etc. which offer autohacks, but to create a free, quick, standalone application which is easy to use and doesn’t require a lot of support of other dependencies. Also not forgetting that winAUTOPWN unlike other frameworks maintains the original exploit writer’s source code intact just as it was and uses it. This way the exploit writer’s credit and originality is maintained. The source is modified only when required to enable a missing feature or to remove hard-coded limitations. Under these circumstances also, the exploit writers credits remain intact.
winAUTOPWN v1.7.0 released
The aim of creating winAUTOPWN is not to compete with already existing commercial frameworks like Core Impact (Pro), Immunity Canvas, Metasploit Framework (freeware), etc. which offer autohacks, but to create a free, quick, standalone application which is easy to use and doesn’t require a lot of support of other dependencies.
Also not forgetting that winAUTOPWN unlike other frameworks maintains the original exploit writer’s source code intact just as it was and uses it. This way the exploit writer’s credit and originality is maintained. The source is modified only when required to enable a missing feature or to remove hard-coded limitations. Under these circumstances also, the exploit writers credits remain intact.