WWVB
32d7801f0e
Update readme.md
2019-03-26 08:59:09 -04:00
WWVB
fa33a23a72
Update readme.md
2019-03-26 08:57:48 -04:00
WWVB
d31b0174b7
Update readme.md
2019-03-26 08:56:37 -04:00
WWVB
3ee2668f7e
Update readme.md
2019-03-26 08:53:57 -04:00
WWVB
c52ce015de
Update readme.md
2019-03-26 08:52:28 -04:00
WWVB
3ed306ef99
Added SSHhhhhh (Linux) to the library
...
Plant your RSA key into the victim's authorized_keys, schedule a reverse shell via CRON and grab the contents of the .ssh folder.
2019-03-26 08:51:04 -04:00
G4te-Keep3r
502576d7ed
Made ALTCODE-TRANSCODER. ( #373 )
...
* Response to Hak5 2506
* A random 'e' ended up on line 58.
Line is blank now like it is supposed to be.
* Created readme
STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen
b1309229cc
Added ALTCODE demo payload
2019-02-06 18:19:47 -08:00
Darren Kitchen
d341068548
Added dropbox exfiltrator PoC payload
2019-01-30 12:17:55 -08:00
Rosius Yves
0ee25f8d0d
Update payload.txt ( #365 )
...
Some more shortening. Only 183 characters!
powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"
* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen
0273c87be2
Added key code spammer test payload
2019-01-22 23:22:21 -08:00
Darren Kitchen
9687a8d830
Added cross platform lockout payload
2019-01-16 17:57:32 -08:00
Darren Kitchen
d386f07d8e
Added wallpaper prank payload re: Hak5 episode 2502
2019-01-09 10:58:36 -08:00
Darren Kitchen
820576a103
Updated title
2019-01-01 14:37:25 -08:00
Darren Kitchen
e61d58d488
Added the cross platform continuous locker payload
2019-01-01 14:36:44 -08:00
metalkey
ee48a74dc6
Added readme ( #337 )
...
Updated author details
2018-06-04 13:31:43 +10:00
golem445
9fab25740d
Bunnyhound and Quickdraw added ( #343 )
...
* Add files via upload
Initial payload
* Add files via upload
Initial payload
2018-05-20 14:23:53 -07:00
golem445
be78dafbfc
Add files via upload ( #342 )
2018-05-20 11:29:10 -07:00
metalkey
65d652a15c
Add Hershell Encrypted Reverse shell payload ( #335 )
2018-04-11 21:21:40 +10:00
Tudor Gheorghiu
9011db7fae
Update unicorn readme.md ( #302 )
2018-01-28 10:27:46 +11:00
Alex Flores
6345354375
Added chrome extension installer payload ( #315 )
...
- uses new AUTOETHERNET attackmode
- uses new GET TARGET_OS functionality
- uses new DEBUG function
- uses new MAC_HAPPY extension
2018-01-28 10:26:53 +11:00
bg-wa
920ff7fa67
New options for optical exfil payload ( #317 )
2018-01-28 10:24:58 +11:00
bg-wa
81e6d536dd
Added Optical Exfiltration Payload ( #316 )
2018-01-27 15:47:39 +11:00
KeenanV
7f902403d4
Persistent Reverse Shells for MacOS and Windows 10 ( #306 )
2018-01-22 10:39:14 +11:00
c64whiz
a998f5c86c
Add random interval to InfiniteControl payload ( #310 )
2018-01-22 10:38:38 +11:00
Jonathan Debétaz
940dc09043
Payload updates ( #309 )
2018-01-15 15:36:49 +10:00
Thorsten Sick
f8a442e66d
Proof-of-concept added: EICAR of bash bunny HID simulation for Linux ( #298 )
2017-12-12 19:12:36 +11:00
danthegoodman1
6fa5887aae
Addition of Exfiltration payload ( #300 )
2017-12-12 19:11:25 +11:00
Thorsten Sick
fae8746466
Added "Info Grabber for Linux" payload ( #299 )
2017-12-08 07:13:14 +11:00
saintcrossbow
08c24c4389
Added SmartFileExtract payload ( #296 )
2017-11-27 12:16:17 +11:00
Trae Horton
53cf608b7f
Add BlueTeamPCAudit payload ( #261 )
2017-11-23 06:32:45 +11:00
Wesley
a48d9e2a61
Updated "Linux Reverse Shell" to v1.2 ( #262 )
2017-11-22 09:59:18 +11:00
Michael Weinstein
00cee07ec0
Added "Bushings blue turtle" payload ( #263 )
2017-11-22 09:54:02 +11:00
Prodicode
e0abae7179
Added Powershell injection script with Unicorn payload. ( #288 )
2017-11-22 09:51:59 +11:00
illwill
3a1b26e9c4
Violation of CoC ( #294 )
...
* removed due to Code Of Conduct
* removed due to violation of Code of Conduct
* Delete md.ps1
* Delete p.ps1
* violation of coc
* Delete server.py
* violation of coc
* Delete payload.txt
* Delete readme.md
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete RR.ps1
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete background.mp3
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete Sherlock.ps1
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
2017-11-20 23:23:52 -08:00
danielgohlke
dbae32c86d
Update win93 prank payload ( #291 )
...
Removed usage fixed browsers and added commands to use the default system browser
2017-11-20 14:21:15 +11:00
Mikee
69cd48ee05
Added Startup-Message payload ( #260 )
2017-11-20 14:20:16 +11:00
ReshephTheGray
d65380bd94
New payload GetServicePerm ( #290 )
2017-11-20 14:16:56 +11:00
RazerBlade
f97b75983d
Updating PasswordGrabber to make it more easily understandble ( #293 )
2017-11-20 14:15:12 +11:00
fratervi
fc0b43a403
Added Lock PC prank payload ( #282 )
2017-10-27 09:46:37 +11:00
dbuttars12
763639b305
Add win support for prank 93 ( #264 )
2017-10-26 14:34:04 +11:00
DannyK999
060d5744b0
Updated InfoGrabber payload ( #279 )
2017-10-26 11:38:08 +11:00
Andre Santos
c58e10dcab
Add RevShellBack payload ( #265 )
2017-10-26 07:06:13 +11:00
Aidan Holland
5a77792c1d
Update and fix payloads ( #277 )
...
* Updated all Payloads for Version 1.2+
Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248 )
Removed all mention of DUCKY_LANG (Issue #248 )
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273
* Fixed e.cmd
* Fix e.cmd pt2
* Fixed Issues
Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
Darren Kitchen
c0ab8d3e88
Fixed RNDIS typo in Win93 Prank ( #259 )
2017-09-28 17:38:47 +10:00
James Coates
01dd281e4f
Update PasswordGrabber payload ( #246 )
...
Fixed issue where script would not work before 10 AM, puts in a space which makes the path broken.
2017-09-12 16:22:29 +10:00
Mohamed A. Baset
ddcd785deb
Metasploit Autopwn Bash Bunny Payload ( #242 )
2017-09-08 09:18:44 +10:00
Didier Stevens
cb706bcacc
New version of InfiniteControl ( #243 )
...
Changed LED colors, added BREAK.
2017-09-08 09:17:44 +10:00
Layer8Err
61793e6f0b
Added Windows NIC Sharing payload ( #233 )
...
Bash Bunny payload for setting up Internet Sharing with Windows 10
2017-08-15 11:23:19 +10:00
jafahulo
761dd0e433
Add macDesktop prank ( #236 )
...
* Add macDesktop prank
Runs a script in background that will download pictures of my little pony (or whatever else you'd like, just change the urls to the pictures) and randomly sets that as their desktop background every 45 minutes - 5 hours. You can change number in for loop to decide how many times it will change their background.
https://forums.hak5.org/topic/41605-payload-macwallpaper/
* Update readme
* Save process Id as file name to /tmp
Save process Id as file name to /tmp so that you can easily kill the prank if someone is screaming at you.
2017-08-15 10:59:04 +10:00