Commit Graph

626 Commits

Author SHA1 Message Date
Mohamed A. Baset
92f1be3a52 A little nasty trick!
Sometimes the host name is the same as the username so we will add it to the username and the password wordlists automatically to be used during the brute force attack.
2019-05-30 01:43:13 -05:00
Mohamed A. Baset
b3537e7a65 Update payload.txt 2019-05-30 00:55:17 -05:00
Mohamed A. Baset
d9d741e828 Update readme.md 2019-05-30 00:54:11 -05:00
Mohamed A. Baset
0973bf25ec Create payload.txt 2019-05-30 00:50:08 -05:00
Mohamed A. Baset
fcb15af701 Update readme.md 2019-05-30 00:36:31 -05:00
Mohamed A. Baset
ddffe360a4 Update readme.md 2019-05-30 00:35:55 -05:00
Mohamed A. Baset
bb2c9c5bfd Create mmcbrute.py 2019-05-30 00:31:56 -05:00
Mohamed A. Baset
4778effde3 Create README.md 2019-05-30 00:31:11 -05:00
Mohamed A. Baset
0ac9056917 Create LICENSE 2019-05-30 00:30:30 -05:00
Mohamed A. Baset
fcac3b6d29 Create userlist.txt 2019-05-30 00:08:51 -05:00
Mohamed A. Baset
031a47b0d2 Create passlist.txt 2019-05-30 00:07:30 -05:00
Mohamed A. Baset
d11515bf59 Create readme.md 2019-05-30 00:05:43 -05:00
Darren Kitchen
36e34feac4 Update payload.txt 2019-05-28 12:42:10 -07:00
Catatonic
c282540f52 Clarying documentation based on user feedback. (#381) 2019-05-22 18:46:59 -07:00
Catatonic
f171837db2 Add Jackalope (#380)
* Adding Jackalope, a Bunny+Metasploit chimera project.

* Fixing inaccurate documentation.

* Generate the password entry payload on the alternate switch.

* Additional documentation concerning alternate payload mechanism.

* Branding

* Update readme.md

* rearchitecting payload to be independent. No longer overwrites alternate payload location. Uses WAIT interface to interact with the tester to reuse a password, clear the password, and re-attack the machine.
2019-05-22 16:53:59 -07:00
TheDragonkeeper
ca22f20b53 Update payload.txt 2019-04-20 04:48:38 +01:00
TheDragonkeeper
d22c2481a0 Update Readme.md 2019-04-20 04:46:02 +01:00
TheDragonkeeper
63c62a4871 Update Readme.md 2019-04-20 04:34:31 +01:00
TheDragonkeeper
81b4e060c8 Update Readme.md 2019-04-20 04:33:15 +01:00
TheDragonkeeper
a9b191045b added all auth options 2019-04-20 03:59:41 +01:00
TheDragonkeeper
bed7de2cd4 Update payload.sh 2019-04-08 19:16:09 +01:00
TheDragonkeeper
f573cb9b0b Create payload.sh 2019-04-08 18:43:01 +01:00
TheDragonkeeper
cda2430080 ChromeOS Enrolment Payload 2019-04-06 03:14:38 +01:00
TheDragonkeeper
963c000ab9 added keylogger 2019-04-06 00:50:03 +01:00
Kamots
6760498c27 Created waiteject.sh to wait on USB storage eject. (#374) 2019-03-29 15:03:54 -07:00
WWVB
16efe8b05b Added ARP to loot 2019-03-28 10:31:55 -04:00
WWVB
f9d4737fc0 Added ARP data to the loot 2019-03-28 10:30:47 -04:00
Darren Kitchen
7c8fbf0f41 Extension by Raf 2019-03-26 18:28:18 -07:00
WWVB
230a677aa3 Update readme.md 2019-03-26 09:42:49 -04:00
WWVB
40a9afa7c4 Update readme.md 2019-03-26 09:01:09 -04:00
WWVB
470fd8a0ce Update readme.md 2019-03-26 09:00:28 -04:00
WWVB
32d7801f0e Update readme.md 2019-03-26 08:59:09 -04:00
WWVB
fa33a23a72 Update readme.md 2019-03-26 08:57:48 -04:00
WWVB
d31b0174b7 Update readme.md 2019-03-26 08:56:37 -04:00
WWVB
3ee2668f7e Update readme.md 2019-03-26 08:53:57 -04:00
WWVB
c52ce015de Update readme.md 2019-03-26 08:52:28 -04:00
WWVB
3ed306ef99 Added SSHhhhhh (Linux) to the library
Plant your RSA key into the victim's authorized_keys, schedule a reverse shell via CRON and grab the contents of the .ssh folder.
2019-03-26 08:51:04 -04:00
G4te-Keep3r
502576d7ed Made ALTCODE-TRANSCODER. (#373)
* Response to Hak5 2506

* A random 'e' ended up on line 58.

Line is blank now like it is supposed to be.

* Created readme

STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen
b1309229cc Added ALTCODE demo payload 2019-02-06 18:19:47 -08:00
Darren Kitchen
d341068548 Added dropbox exfiltrator PoC payload 2019-01-30 12:17:55 -08:00
Rosius Yves
0ee25f8d0d Update payload.txt (#365)
Some more shortening. Only 183 characters!

powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"

* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
 switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen
0273c87be2 Added key code spammer test payload 2019-01-22 23:22:21 -08:00
0rion
fed24a87b4 Update Info.ps1
Gets COM& Serial Device PID&VID if doing a walk about and want to collect info on HID/PID&VID + MI for future use. just a thought
#Get - Com & Serial Devices
$COMDevices = Get-Wmiobject Win32_USBControllerDevice | ForEach-Object{[Wmi]($_.Dependent)} | Select-Object Name, DeviceID, Manufacturer | Sort-Object -Descending Name | Format-Table

"COM & SERIAL DEVICES"
"==================================================================" + ($COMDevices | Out-String)
""
2019-01-17 19:29:40 -07:00
0rion
9777ae0fee Update for Info.ps1
Removes all Variables created during the session. I noticed my version of PS was storing them between simulated attacks. so removing them entirely was my resolve.

Remove-Variable -Name computerPubIP,
computerIP,IsDHCPEnabled,Network,Networks, 
computerMAC,computerSystem,computerBIOS,computerOs,
computerCpu, computerMainboard,computerRamCapacity,
computerRam,driveType,Hdds,RDP,WLANProfileNames,WLANProfileName,
Output,WLANProfileObjects,WLANProfilePassword,WLANProfileObject,luser,
process,listener,listenerItem,process,service,software,drivers,videocard,
vault -ErrorAction SilentlyContinue -Force
2019-01-17 19:21:02 -07:00
Darren Kitchen
9687a8d830 Added cross platform lockout payload 2019-01-16 17:57:32 -08:00
Darren Kitchen
d386f07d8e Added wallpaper prank payload re: Hak5 episode 2502 2019-01-09 10:58:36 -08:00
Darren Kitchen
820576a103 Updated title 2019-01-01 14:37:25 -08:00
Darren Kitchen
e61d58d488 Added the cross platform continuous locker payload 2019-01-01 14:36:44 -08:00
Eric Briese
e0c355da0a Changed options to be in payload.txt per best practices 2018-12-29 22:51:23 +10:00
Eric
e527ab16a5 Moved screen height and width to config file. 2018-12-29 22:27:19 +10:00