[WEB SECURITY] winAUTOPWN v1.8 - Introducing [welf 1.0] WINDOWS AUTOPWN EXPLOIT LOADING FRAMEWORK
quakerdoomer at inbox.lv
Sat Apr 11 08:05:01 EDT 2009
I am pleased to announce one more release of winAUTOPWN today on 11th April
This version contains all exploits uptill 11th April 2009.
This version also introduces The WINDOWS AUTOPWN EXPLOIT LOADING
FRAMEWORK [ welf ]
the welf Language ( WELL - [ WINDOWS AUTOPWN EXPLOIT LOADING
LANGUAGE ] )
By scripting in WELL and loading it using welf you can include your own exploits now
and command winAUTOPWN to execute it.
You can use welf to include any old exploit not yet included by winAUTOPWN, or any
existing already included exploit and even zero day exploits which you want to keep
for private use.
Note that if you keep a proper track of exploits and keep scripting and adding
it into welf you can even stay away from updating your winAUTOPWN copy (As long
as you want but I wouldn't like/advise it).
Keep the exploits you wish to trigger using welf in the "welfexploits/" folder
Use the "-welf <welf_script_name)" option along with winAUTOPWN.EXE to
load welf. Your "welfexploits/" already has enough information about the scripting
One more Important declaration :
As incorrectly mentioned at many websites, I would like to clear that WINAUTOPWN
is NOT a TooL/Framework to just hack WINDOWS alone.
WINDOWS AUTOPWN DOES NOT mean that is a TooL to hack windows BUT its a
TooL which runs on windows (as of today) and can potentially get you a shell for
anything Device/OS/App/etc. vulnerable with its existing appropriate exploit contained
Enjoy the Release.
The Latest available release now is winAUTOPWN version 1.7
Coded by : Azim Poonawala (QUAKERDOOMER)
winAUTOPWN available at http://winautopwn.co.nr
Author's website : http://solidmecca.co.nr
winAUTOPWN is updated almost daily. Check the Download page for weekly
Latest Release can always be downloaded from : http://winautopwn.exofire.net/
"winAUTOPWN - WINDOWS AUTOPWN (For The True HyperSomniac H-a-c-k-e-r-z-
Join us on IRC: irc.freenode.net #webappsec
Have a question? Search The Web Security Mailing List Archives:
Subscribe via RSS:
http://www.webappsec.org/rss/websecurity.rss [RSS Feed]
Join WASC on LinkedIn
More information about the websecurity