Commit Graph

396 Commits

Author SHA1 Message Date
Marc
9a6d515add Jackalope: Un-comment REQUIRE_TOOL.
Starting with 1.6, a Metasploit tools package will be available.
2019-07-04 00:10:24 +01:00
Marc
947b08fc0f Update Jackalope to remove references to RVM.
Starting with Firmware 1.6 and the Metasploit tools package, RVM will no longer be needed.
2019-07-04 00:08:01 +01:00
Marc
938fe29c94 Merge pull request #379 from TheDragonkeeper/chromeos
Chromeos Enrollment
2019-06-28 20:50:17 +00:00
Marc
e82fb6166b Merge pull request #347 from mathew-fleisch/master
Two Stage Mac Payload
2019-06-28 20:20:33 +00:00
Marc
f9aadb0a4d Merge pull request #339 from JamesCullum/master
Updated RaZ_ReverseShell
2019-06-28 00:25:07 +00:00
Marc
00b2ea8aa9 Merge pull request #340 from hink/master
[PAYLOAD UPDATE] psh_DownloadExec Update
2019-06-28 00:23:05 +00:00
Marc
0b9f7c0b47 Merge pull request #349 from TheG3ntl3man/patch-1
Adding Delay to Prank/Startup-Message
2019-06-28 00:15:21 +00:00
Marc
b6af89dbdc Merge pull request #360 from Atrolantra/master
Moved screen height and width to configurable options
2019-06-28 00:07:40 +00:00
Marc
2f23f34e6a Merge pull request #367 from 0rion5/patch-4
Update for Info.ps1
2019-06-28 00:04:13 +00:00
Marc
d3727bd899 Merge pull request #368 from 0rion5/patch-5
Update Info.ps1
2019-06-28 00:03:29 +00:00
Darren Kitchen
aec718806e Update payload.txt 2019-06-06 12:45:35 -07:00
Darren Kitchen
8dd4797e5d Update payload.txt 2019-06-06 12:45:12 -07:00
Mohamed A. Baset
3980bab638 Critical fixes
I really missed the BB's original variable "$SWITCH_POSITION" since in my testing BB's payload I'm maintaining it in my code as: 

ORIGINAL_SWITCH="/root/udisk/payloads/$SWITCH_POSITION"

Thanks to @catatonicprime for offering the fix for this issue.
2019-06-01 02:22:45 -05:00
Mohamed A. Baset
6ee12332e5 Update userlist.txt 2019-06-01 02:03:17 -05:00
Mohamed A. Baset
0a407d0348 Update userlist.txt 2019-05-30 04:08:46 -05:00
Mohamed A. Baset
0068cfccd5 Update payload.txt 2019-05-30 04:01:38 -05:00
Mohamed A. Baset
072c659943 Update payload.txt 2019-05-30 03:44:12 -05:00
Mohamed A. Baset
92f1be3a52 A little nasty trick!
Sometimes the host name is the same as the username so we will add it to the username and the password wordlists automatically to be used during the brute force attack.
2019-05-30 01:43:13 -05:00
Mohamed A. Baset
b3537e7a65 Update payload.txt 2019-05-30 00:55:17 -05:00
Mohamed A. Baset
d9d741e828 Update readme.md 2019-05-30 00:54:11 -05:00
Mohamed A. Baset
0973bf25ec Create payload.txt 2019-05-30 00:50:08 -05:00
Mohamed A. Baset
fcb15af701 Update readme.md 2019-05-30 00:36:31 -05:00
Mohamed A. Baset
ddffe360a4 Update readme.md 2019-05-30 00:35:55 -05:00
Mohamed A. Baset
bb2c9c5bfd Create mmcbrute.py 2019-05-30 00:31:56 -05:00
Mohamed A. Baset
4778effde3 Create README.md 2019-05-30 00:31:11 -05:00
Mohamed A. Baset
0ac9056917 Create LICENSE 2019-05-30 00:30:30 -05:00
Mohamed A. Baset
fcac3b6d29 Create userlist.txt 2019-05-30 00:08:51 -05:00
Mohamed A. Baset
031a47b0d2 Create passlist.txt 2019-05-30 00:07:30 -05:00
Mohamed A. Baset
d11515bf59 Create readme.md 2019-05-30 00:05:43 -05:00
Darren Kitchen
36e34feac4 Update payload.txt 2019-05-28 12:42:10 -07:00
Catatonic
c282540f52 Clarying documentation based on user feedback. (#381) 2019-05-22 18:46:59 -07:00
Catatonic
f171837db2 Add Jackalope (#380)
* Adding Jackalope, a Bunny+Metasploit chimera project.

* Fixing inaccurate documentation.

* Generate the password entry payload on the alternate switch.

* Additional documentation concerning alternate payload mechanism.

* Branding

* Update readme.md

* rearchitecting payload to be independent. No longer overwrites alternate payload location. Uses WAIT interface to interact with the tester to reuse a password, clear the password, and re-attack the machine.
2019-05-22 16:53:59 -07:00
TheDragonkeeper
ca22f20b53 Update payload.txt 2019-04-20 04:48:38 +01:00
TheDragonkeeper
d22c2481a0 Update Readme.md 2019-04-20 04:46:02 +01:00
TheDragonkeeper
63c62a4871 Update Readme.md 2019-04-20 04:34:31 +01:00
TheDragonkeeper
81b4e060c8 Update Readme.md 2019-04-20 04:33:15 +01:00
TheDragonkeeper
a9b191045b added all auth options 2019-04-20 03:59:41 +01:00
TheDragonkeeper
cda2430080 ChromeOS Enrolment Payload 2019-04-06 03:14:38 +01:00
G4te-Keep3r
502576d7ed Made ALTCODE-TRANSCODER. (#373)
* Response to Hak5 2506

* A random 'e' ended up on line 58.

Line is blank now like it is supposed to be.

* Created readme

STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen
b1309229cc Added ALTCODE demo payload 2019-02-06 18:19:47 -08:00
Darren Kitchen
d341068548 Added dropbox exfiltrator PoC payload 2019-01-30 12:17:55 -08:00
Rosius Yves
0ee25f8d0d Update payload.txt (#365)
Some more shortening. Only 183 characters!

powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"

* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
 switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen
0273c87be2 Added key code spammer test payload 2019-01-22 23:22:21 -08:00
0rion
fed24a87b4 Update Info.ps1
Gets COM& Serial Device PID&VID if doing a walk about and want to collect info on HID/PID&VID + MI for future use. just a thought
#Get - Com & Serial Devices
$COMDevices = Get-Wmiobject Win32_USBControllerDevice | ForEach-Object{[Wmi]($_.Dependent)} | Select-Object Name, DeviceID, Manufacturer | Sort-Object -Descending Name | Format-Table

"COM & SERIAL DEVICES"
"==================================================================" + ($COMDevices | Out-String)
""
2019-01-17 19:29:40 -07:00
0rion
9777ae0fee Update for Info.ps1
Removes all Variables created during the session. I noticed my version of PS was storing them between simulated attacks. so removing them entirely was my resolve.

Remove-Variable -Name computerPubIP,
computerIP,IsDHCPEnabled,Network,Networks, 
computerMAC,computerSystem,computerBIOS,computerOs,
computerCpu, computerMainboard,computerRamCapacity,
computerRam,driveType,Hdds,RDP,WLANProfileNames,WLANProfileName,
Output,WLANProfileObjects,WLANProfilePassword,WLANProfileObject,luser,
process,listener,listenerItem,process,service,software,drivers,videocard,
vault -ErrorAction SilentlyContinue -Force
2019-01-17 19:21:02 -07:00
Darren Kitchen
9687a8d830 Added cross platform lockout payload 2019-01-16 17:57:32 -08:00
Darren Kitchen
d386f07d8e Added wallpaper prank payload re: Hak5 episode 2502 2019-01-09 10:58:36 -08:00
Darren Kitchen
820576a103 Updated title 2019-01-01 14:37:25 -08:00
Darren Kitchen
e61d58d488 Added the cross platform continuous locker payload 2019-01-01 14:36:44 -08:00
Eric Briese
e0c355da0a Changed options to be in payload.txt per best practices 2018-12-29 22:51:23 +10:00