From 2f1545eb35572ec2b5a492bee7304556f51a8af2 Mon Sep 17 00:00:00 2001 From: 0iphor13 <79219148+0iphor13@users.noreply.github.com> Date: Wed, 25 Jan 2023 11:49:50 +0100 Subject: [PATCH] Update README.md --- .../remote_access/ReverseBunny/README.md | 18 +++++++----------- 1 file changed, 7 insertions(+), 11 deletions(-) diff --git a/payloads/library/remote_access/ReverseBunny/README.md b/payloads/library/remote_access/ReverseBunny/README.md index 5cd530b3..6a1b7f98 100644 --- a/payloads/library/remote_access/ReverseBunny/README.md +++ b/payloads/library/remote_access/ReverseBunny/README.md @@ -1,17 +1,13 @@ -**Title: ReverseBunny** +**Title: ReverseBunny** -Author: 0iphor13 - -Version: 1.3 +
Author: 0iphor13
+OS: Windows
+Version: 1.5
Getting remote access via obfuscated reverse shell.
+Upload payload.txt and RevBunny.ps1 onto your Bunny
+
Change the variables in payload.txt to your attacking maschine & start your listener. (for example netcat: nc -lvnp [PORT] )