Basically it wraps your shellcode in a nice and quick way to execute it. Rather then using a classic launch function like the following one:
char code = “bytecode will go here!”;
int main(int argc, char **argv)
func = (int (*)()) code;
just copy and paste the shellcode from metasploit or from your own one, and here we go… you’ll be able to run into Windows machines without any trouble your favorite shell :D. If you don’t need Windows PE header you can decide to keep only the byte-code by checking the checkbox in the bottom of the form. This is a very useful tool, thank you SandSprite .