Commit Graph

300 Commits

Author SHA1 Message Date
Marc
37de2446e3 Cleanup: ShellExec: Update Payload Header 2019-07-05 08:07:06 +01:00
Marc
759b114db9 Cleanup: RevShellBack: Update Payload Header 2019-07-05 08:05:28 +01:00
Marc
1e1e9cfcb1 Cleanup: RAZ_VBScript: Update Payload Header 2019-07-05 08:02:57 +01:00
Foxtrot
faf0c7411e Cleanup: Rename Incident_Response -> incident_response 2019-07-05 08:00:23 +01:00
Marc
c2d79df555 Cleanup: Macinfograbber: Update Payload Header 2019-07-05 07:56:24 +01:00
Marc
67527e8ce0 Cleanup: bushingsBlueTurtle: Update Payload Header 2019-07-05 07:54:50 +01:00
Marc
39b0d2887a Cleanup: WifiPass: Update Payload Header 2019-07-05 07:52:04 +01:00
Marc
37d8415e0e Cleanup: WiFiGrabber: Update Payload Header 2019-07-05 07:50:05 +01:00
Marc
1b4af72c46 Cleanup: SudoBackdoor: Update Payload Header 2019-07-05 07:47:52 +01:00
Marc
98b9d9fc37 Cleanup: SudoBackdoor: Update Payload Header 2019-07-05 07:45:59 +01:00
Marc
2f18d8a328 Cleanup: Roaster: Update Payload header 2019-07-05 07:43:58 +01:00
Marc
5fc5a3b0b5 Cleanup: Quickdraw: Update payload header. 2019-07-05 07:41:30 +01:00
Marc
2dbb38e372 Cleanup: PasswordGrabber: Update payload header. 2019-07-05 05:43:56 +00:00
Marc
02f90b6b46 Cleanup: Jackalope: Add new payload header 2019-07-05 05:41:30 +00:00
Marc
8947bcfb8e Cleanup: DumpCreds: Add new payload header 2019-07-05 05:35:05 +00:00
Marc
125a5fff62 cleanup: BunnyHound: Add new payload header 2019-07-05 05:29:07 +00:00
Marc
e86e64c21c Cleanup: BunnyTap: Add new header to payload. 2019-07-05 05:24:26 +00:00
Marc
49b157156d Cleanup: BruteBunny: Update payload header. 2019-07-05 05:20:06 +00:00
Marc
dfdc89f773 Cleanup: open_url: Update payload header. 2019-07-05 05:16:03 +00:00
Marc
91bea999f6 Cleanup: FireyTV: Add target to new header 2019-07-05 05:14:10 +00:00
Marc
f9e73fb7c1 Cleanup: Update FireyTV payload to contain new header 2019-07-05 05:12:50 +00:00
Marc
5268568869 Cleanup: Update Link File Analysis payload to have new header. 2019-07-05 05:10:48 +00:00
Marc
8047cb218a Cleanup: Update Hidden_Images to include new payload header. 2019-07-05 05:06:43 +00:00
Marc
938fe29c94 Merge pull request #379 from TheDragonkeeper/chromeos
Chromeos Enrollment
2019-06-28 20:50:17 +00:00
Marc
e82fb6166b Merge pull request #347 from mathew-fleisch/master
Two Stage Mac Payload
2019-06-28 20:20:33 +00:00
Marc
f9aadb0a4d Merge pull request #339 from JamesCullum/master
Updated RaZ_ReverseShell
2019-06-28 00:25:07 +00:00
Marc
00b2ea8aa9 Merge pull request #340 from hink/master
[PAYLOAD UPDATE] psh_DownloadExec Update
2019-06-28 00:23:05 +00:00
Marc
0b9f7c0b47 Merge pull request #349 from TheG3ntl3man/patch-1
Adding Delay to Prank/Startup-Message
2019-06-28 00:15:21 +00:00
Marc
b6af89dbdc Merge pull request #360 from Atrolantra/master
Moved screen height and width to configurable options
2019-06-28 00:07:40 +00:00
Marc
2f23f34e6a Merge pull request #367 from 0rion5/patch-4
Update for Info.ps1
2019-06-28 00:04:13 +00:00
Marc
d3727bd899 Merge pull request #368 from 0rion5/patch-5
Update Info.ps1
2019-06-28 00:03:29 +00:00
Darren Kitchen
aec718806e Update payload.txt 2019-06-06 12:45:35 -07:00
Darren Kitchen
8dd4797e5d Update payload.txt 2019-06-06 12:45:12 -07:00
Darren Kitchen
36e34feac4 Update payload.txt 2019-05-28 12:42:10 -07:00
Catatonic
c282540f52 Clarying documentation based on user feedback. (#381) 2019-05-22 18:46:59 -07:00
Catatonic
f171837db2 Add Jackalope (#380)
* Adding Jackalope, a Bunny+Metasploit chimera project.

* Fixing inaccurate documentation.

* Generate the password entry payload on the alternate switch.

* Additional documentation concerning alternate payload mechanism.

* Branding

* Update readme.md

* rearchitecting payload to be independent. No longer overwrites alternate payload location. Uses WAIT interface to interact with the tester to reuse a password, clear the password, and re-attack the machine.
2019-05-22 16:53:59 -07:00
TheDragonkeeper
ca22f20b53 Update payload.txt 2019-04-20 04:48:38 +01:00
TheDragonkeeper
d22c2481a0 Update Readme.md 2019-04-20 04:46:02 +01:00
TheDragonkeeper
63c62a4871 Update Readme.md 2019-04-20 04:34:31 +01:00
TheDragonkeeper
81b4e060c8 Update Readme.md 2019-04-20 04:33:15 +01:00
TheDragonkeeper
a9b191045b added all auth options 2019-04-20 03:59:41 +01:00
TheDragonkeeper
cda2430080 ChromeOS Enrolment Payload 2019-04-06 03:14:38 +01:00
G4te-Keep3r
502576d7ed Made ALTCODE-TRANSCODER. (#373)
* Response to Hak5 2506

* A random 'e' ended up on line 58.

Line is blank now like it is supposed to be.

* Created readme

STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen
b1309229cc Added ALTCODE demo payload 2019-02-06 18:19:47 -08:00
Darren Kitchen
d341068548 Added dropbox exfiltrator PoC payload 2019-01-30 12:17:55 -08:00
Rosius Yves
0ee25f8d0d Update payload.txt (#365)
Some more shortening. Only 183 characters!

powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"

* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
 switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen
0273c87be2 Added key code spammer test payload 2019-01-22 23:22:21 -08:00
0rion
fed24a87b4 Update Info.ps1
Gets COM& Serial Device PID&VID if doing a walk about and want to collect info on HID/PID&VID + MI for future use. just a thought
#Get - Com & Serial Devices
$COMDevices = Get-Wmiobject Win32_USBControllerDevice | ForEach-Object{[Wmi]($_.Dependent)} | Select-Object Name, DeviceID, Manufacturer | Sort-Object -Descending Name | Format-Table

"COM & SERIAL DEVICES"
"==================================================================" + ($COMDevices | Out-String)
""
2019-01-17 19:29:40 -07:00
0rion
9777ae0fee Update for Info.ps1
Removes all Variables created during the session. I noticed my version of PS was storing them between simulated attacks. so removing them entirely was my resolve.

Remove-Variable -Name computerPubIP,
computerIP,IsDHCPEnabled,Network,Networks, 
computerMAC,computerSystem,computerBIOS,computerOs,
computerCpu, computerMainboard,computerRamCapacity,
computerRam,driveType,Hdds,RDP,WLANProfileNames,WLANProfileName,
Output,WLANProfileObjects,WLANProfilePassword,WLANProfileObject,luser,
process,listener,listenerItem,process,service,software,drivers,videocard,
vault -ErrorAction SilentlyContinue -Force
2019-01-17 19:21:02 -07:00
Darren Kitchen
9687a8d830 Added cross platform lockout payload 2019-01-16 17:57:32 -08:00