251 Commits

Author SHA1 Message Date
Aidan Holland
5f31a0be02 Fix README.md (#321) 2018-01-31 09:16:23 +11:00
Tudor Gheorghiu
9011db7fae Update unicorn readme.md (#302) 2018-01-28 10:27:46 +11:00
Alex Flores
6345354375 Added chrome extension installer payload (#315)
- uses new AUTOETHERNET attackmode
 - uses new GET TARGET_OS functionality
 - uses new DEBUG function
 - uses new MAC_HAPPY extension
2018-01-28 10:26:53 +11:00
Alex Flores
65ad5f6e89 fixes mac_happy extension (#313)
- fixes state leakage of `command` variable by removing it
 - remove unecessary use of forked processes/sub-commands
 - combine input validation conditionals
 - match the standard of existing extensions of exporting function
   names as all caps
 - bump version number
2018-01-28 10:25:55 +11:00
bg-wa
920ff7fa67 New options for optical exfil payload (#317) 2018-01-28 10:24:58 +11:00
bg-wa
81e6d536dd Added Optical Exfiltration Payload (#316) 2018-01-27 15:47:39 +11:00
Alex Flores
b37aed0edc fixes debug extention (#312)
- resolve sytax errors with variable declarations
 - resolve misuse of command substition / variabl dereferencing
 - internal functions were being called before being declared
 - remove superfluous file existence checks
2018-01-24 06:12:30 +11:00
KeenanV
7f902403d4 Persistent Reverse Shells for MacOS and Windows 10 (#306) 2018-01-22 10:39:14 +11:00
c64whiz
a998f5c86c Add random interval to InfiniteControl payload (#310) 2018-01-22 10:38:38 +11:00
Simon Dankelmann
b644446f40 Added German umlauts to de.json (#311) 2018-01-22 10:37:26 +11:00
Jonathan Debétaz
940dc09043 Payload updates (#309) 2018-01-15 15:36:49 +10:00
bg-wa
650772e9e4 Added debug extension (#155) 2018-01-10 08:22:29 +10:00
Thorsten Sick
f8a442e66d Proof-of-concept added: EICAR of bash bunny HID simulation for Linux (#298) 2017-12-12 19:12:36 +11:00
danthegoodman1
6fa5887aae Addition of Exfiltration payload (#300) 2017-12-12 19:11:25 +11:00
Thorsten Sick
fae8746466 Added "Info Grabber for Linux" payload (#299) 2017-12-08 07:13:14 +11:00
saintcrossbow
08c24c4389 Added SmartFileExtract payload (#296) 2017-11-27 12:16:17 +11:00
Trae Horton
53cf608b7f Add BlueTeamPCAudit payload (#261) 2017-11-23 06:32:45 +11:00
Wesley
a48d9e2a61 Updated "Linux Reverse Shell" to v1.2 (#262) 2017-11-22 09:59:18 +11:00
Michael Weinstein
00cee07ec0 Added "Bushings blue turtle" payload (#263) 2017-11-22 09:54:02 +11:00
Prodicode
e0abae7179 Added Powershell injection script with Unicorn payload. (#288) 2017-11-22 09:51:59 +11:00
illwill
3a1b26e9c4 Violation of CoC (#294)
* removed due to Code Of Conduct

* removed due to violation of Code of Conduct

* Delete md.ps1

* Delete p.ps1

* violation of coc

* Delete server.py

* violation of coc

* Delete payload.txt

* Delete readme.md

* Delete payload.txt


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete payload.txt


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete RR.ps1


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete background.mp3


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete payload.txt


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete Sherlock.ps1


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete payload.txt


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny
2017-11-20 23:23:52 -08:00
Sebastian Kinne
7097f442d3
Update us.json 2017-11-21 13:02:26 +11:00
danielgohlke
dbae32c86d Update win93 prank payload (#291)
Removed usage fixed browsers and added commands to use the default system browser
2017-11-20 14:21:15 +11:00
Mikee
69cd48ee05 Added Startup-Message payload (#260) 2017-11-20 14:20:16 +11:00
ReshephTheGray
d65380bd94 New payload GetServicePerm (#290) 2017-11-20 14:16:56 +11:00
RazerBlade
f97b75983d Updating PasswordGrabber to make it more easily understandble (#293) 2017-11-20 14:15:12 +11:00
Andrej Šimko
2c49f6c09b Added Czech and Slovak layout (#292)
* Added Czech QWERTZ layout

* Added Slovak QWERTY language layout
2017-11-13 11:40:16 +11:00
semefi
98f6231faa Creating LatinAmerican MX Mapping (#283)
json mapping for the Latin American Spanish
2017-10-31 14:19:55 +11:00
fratervi
fc0b43a403 Added Lock PC prank payload (#282) 2017-10-27 09:46:37 +11:00
Sebastian Kinne
f8c2edc325 Ensure all extensions are executable 2017-10-27 08:57:48 +11:00
Sebastian Kinne
e866ad438b Ensure 'GET TARGET_OS' has access to TARGET_IP 2017-10-27 08:57:22 +11:00
dbuttars12
763639b305 Add win support for prank 93 (#264) 2017-10-26 14:34:04 +11:00
DannyK999
060d5744b0 Updated InfoGrabber payload (#279) 2017-10-26 11:38:08 +11:00
Andre Santos
c58e10dcab Add RevShellBack payload (#265) 2017-10-26 07:06:13 +11:00
TheDragonkeeper
b894aa5842 Ensure TARGET_OS is exported (#280) 2017-10-26 06:59:25 +11:00
Aidan Holland
5a77792c1d Update and fix payloads (#277)
* Updated all Payloads for Version 1.2+

Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248)
Removed all mention of DUCKY_LANG (Issue #248)
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273

* Fixed e.cmd

* Fix e.cmd pt2

* Fixed Issues

Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
Darren Kitchen
c0ab8d3e88 Fixed RNDIS typo in Win93 Prank (#259) 2017-09-28 17:38:47 +10:00
James Coates
01dd281e4f Update PasswordGrabber payload (#246)
Fixed issue where script would not work before 10 AM, puts in a space which makes the path broken.
2017-09-12 16:22:29 +10:00
Mohamed A. Baset
ddcd785deb Metasploit Autopwn Bash Bunny Payload (#242) 2017-09-08 09:18:44 +10:00
Didier Stevens
cb706bcacc New version of InfiniteControl (#243)
Changed LED colors, added BREAK.
2017-09-08 09:17:44 +10:00
acyclovirm
b82ccd12b1 Create es-la.json (#244)
This is a Latino american keyboard layout
2017-09-08 09:15:35 +10:00
Layer8Err
61793e6f0b Added Windows NIC Sharing payload (#233)
Bash Bunny payload for setting up Internet Sharing with Windows 10
2017-08-15 11:23:19 +10:00
jafahulo
761dd0e433 Add macDesktop prank (#236)
* Add macDesktop prank

Runs a script in background that will download pictures of my little pony (or whatever else you'd like, just change the urls to the pictures) and randomly sets that as their desktop background every 45 minutes - 5 hours. You can change number in for loop to decide how many times it will change their background.

https://forums.hak5.org/topic/41605-payload-macwallpaper/

* Update readme

* Save process Id as file name to /tmp

Save process Id as file name to /tmp so that you can easily kill the prank if someone is screaming at you.
2017-08-15 10:59:04 +10:00
InvaderSquibs
3c2dd4ac1e Added stickyBunny payload (#232) 2017-07-24 14:00:33 -07:00
Sebastian Kinne
c8b892badb Added Franch Canadian layout (ca-fr) 2017-07-14 08:25:43 +10:00
DavidSpek
6a9134d84b Added Simple Hosts DNS Spoofing payload (#223)
* Local hosts DNS spoofing attack

This is a simple hosts DNS spoofin attack, where the target gets redirected to a set IP when going to a certain website.

* Create README.md

* Update README.md
2017-07-10 07:34:00 +10:00
Johan Moritz
691f7e5bc9 Fixed errors in public IP address command (#226)
When no Internet connection is available the command runs into an error:
"The remote name could not be resolved: 'ipinfo.io'"
Fixed this with a try and catch block

The command also runs into an error when Internet Explorer was never started.
"Invoke-WebRequest : The response content cannot be parsed because the Internet Explorer engine is not available, or Internet Explorer's first-launch configuration is not complete. Specify the
UseBasicParsing parameter and try again"
Fixed this with the -UseBasicParsing parameter
2017-07-10 07:30:55 +10:00
RalphyZ
113e35c736 Fixed a couple of bugs in payloads (#230) 2017-07-10 07:29:38 +10:00
Tristan Mahé
80d622e16e Added Win93 prank payload (#231)
* win93 payload initial release

* readme.md: added TODO

* payload.txt: corrected the command, no need to escape everything

* initial windows support
2017-07-10 07:28:11 +10:00
Murty007
0f83db10f5 Added payload to analyse users .lnk files (#228)
* Add files via upload

* Add files via upload
2017-07-10 07:27:22 +10:00