535 Commits

Author SHA1 Message Date
Jesper Andersen
8a9437ae6e
Update dk.json
Add character "^"
2019-06-27 15:17:53 +02:00
Darren Kitchen
aec718806e
Update payload.txt 2019-06-06 12:45:35 -07:00
Darren Kitchen
8dd4797e5d
Update payload.txt 2019-06-06 12:45:12 -07:00
Mohamed A. Baset
3980bab638
Critical fixes
I really missed the BB's original variable "$SWITCH_POSITION" since in my testing BB's payload I'm maintaining it in my code as: 

ORIGINAL_SWITCH="/root/udisk/payloads/$SWITCH_POSITION"

Thanks to @catatonicprime for offering the fix for this issue.
2019-06-01 02:22:45 -05:00
Mohamed A. Baset
6ee12332e5
Update userlist.txt 2019-06-01 02:03:17 -05:00
Mohamed A. Baset
0a407d0348
Update userlist.txt 2019-05-30 04:08:46 -05:00
Mohamed A. Baset
0068cfccd5
Update payload.txt 2019-05-30 04:01:38 -05:00
Mohamed A. Baset
072c659943
Update payload.txt 2019-05-30 03:44:12 -05:00
Mohamed A. Baset
92f1be3a52
A little nasty trick!
Sometimes the host name is the same as the username so we will add it to the username and the password wordlists automatically to be used during the brute force attack.
2019-05-30 01:43:13 -05:00
Mohamed A. Baset
b3537e7a65
Update payload.txt 2019-05-30 00:55:17 -05:00
Mohamed A. Baset
d9d741e828
Update readme.md 2019-05-30 00:54:11 -05:00
Mohamed A. Baset
0973bf25ec
Create payload.txt 2019-05-30 00:50:08 -05:00
Mohamed A. Baset
fcb15af701
Update readme.md 2019-05-30 00:36:31 -05:00
Mohamed A. Baset
ddffe360a4
Update readme.md 2019-05-30 00:35:55 -05:00
Mohamed A. Baset
bb2c9c5bfd
Create mmcbrute.py 2019-05-30 00:31:56 -05:00
Mohamed A. Baset
4778effde3
Create README.md 2019-05-30 00:31:11 -05:00
Mohamed A. Baset
0ac9056917
Create LICENSE 2019-05-30 00:30:30 -05:00
Mohamed A. Baset
fcac3b6d29
Create userlist.txt 2019-05-30 00:08:51 -05:00
Mohamed A. Baset
031a47b0d2
Create passlist.txt 2019-05-30 00:07:30 -05:00
Mohamed A. Baset
d11515bf59
Create readme.md 2019-05-30 00:05:43 -05:00
Darren Kitchen
36e34feac4
Update payload.txt 2019-05-28 12:42:10 -07:00
John Impallomeni
dba779b304
Change link to https 2019-05-22 21:19:56 -06:00
Catatonic
c282540f52 Clarying documentation based on user feedback. (#381) 2019-05-22 18:46:59 -07:00
Catatonic
f171837db2 Add Jackalope (#380)
* Adding Jackalope, a Bunny+Metasploit chimera project.

* Fixing inaccurate documentation.

* Generate the password entry payload on the alternate switch.

* Additional documentation concerning alternate payload mechanism.

* Branding

* Update readme.md

* rearchitecting payload to be independent. No longer overwrites alternate payload location. Uses WAIT interface to interact with the tester to reuse a password, clear the password, and re-attack the machine.
2019-05-22 16:53:59 -07:00
TheDragonkeeper
ca22f20b53
Update payload.txt 2019-04-20 04:48:38 +01:00
TheDragonkeeper
d22c2481a0
Update Readme.md 2019-04-20 04:46:02 +01:00
TheDragonkeeper
63c62a4871
Update Readme.md 2019-04-20 04:34:31 +01:00
TheDragonkeeper
81b4e060c8
Update Readme.md 2019-04-20 04:33:15 +01:00
TheDragonkeeper
a9b191045b added all auth options 2019-04-20 03:59:41 +01:00
TheDragonkeeper
bed7de2cd4
Update payload.sh 2019-04-08 19:16:09 +01:00
TheDragonkeeper
f573cb9b0b
Create payload.sh 2019-04-08 18:43:01 +01:00
TheDragonkeeper
cda2430080 ChromeOS Enrolment Payload 2019-04-06 03:14:38 +01:00
Kamots
6760498c27 Created waiteject.sh to wait on USB storage eject. (#374) 2019-03-29 15:03:54 -07:00
Darren Kitchen
7c8fbf0f41
Extension by Raf 2019-03-26 18:28:18 -07:00
G4te-Keep3r
502576d7ed Made ALTCODE-TRANSCODER. (#373)
* Response to Hak5 2506

* A random 'e' ended up on line 58.

Line is blank now like it is supposed to be.

* Created readme

STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen
b1309229cc
Added ALTCODE demo payload 2019-02-06 18:19:47 -08:00
Darren Kitchen
d341068548
Added dropbox exfiltrator PoC payload 2019-01-30 12:17:55 -08:00
Joel Tyler
55c7d4f706 Added Discord Server. (#370) 2019-01-24 10:28:29 -08:00
Rosius Yves
0ee25f8d0d Update payload.txt (#365)
Some more shortening. Only 183 characters!

powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"

* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
 switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen
0273c87be2
Added key code spammer test payload 2019-01-22 23:22:21 -08:00
0rion
fed24a87b4
Update Info.ps1
Gets COM& Serial Device PID&VID if doing a walk about and want to collect info on HID/PID&VID + MI for future use. just a thought
#Get - Com & Serial Devices
$COMDevices = Get-Wmiobject Win32_USBControllerDevice | ForEach-Object{[Wmi]($_.Dependent)} | Select-Object Name, DeviceID, Manufacturer | Sort-Object -Descending Name | Format-Table

"COM & SERIAL DEVICES"
"==================================================================" + ($COMDevices | Out-String)
""
2019-01-17 19:29:40 -07:00
0rion
9777ae0fee
Update for Info.ps1
Removes all Variables created during the session. I noticed my version of PS was storing them between simulated attacks. so removing them entirely was my resolve.

Remove-Variable -Name computerPubIP,
computerIP,IsDHCPEnabled,Network,Networks, 
computerMAC,computerSystem,computerBIOS,computerOs,
computerCpu, computerMainboard,computerRamCapacity,
computerRam,driveType,Hdds,RDP,WLANProfileNames,WLANProfileName,
Output,WLANProfileObjects,WLANProfilePassword,WLANProfileObject,luser,
process,listener,listenerItem,process,service,software,drivers,videocard,
vault -ErrorAction SilentlyContinue -Force
2019-01-17 19:21:02 -07:00
Darren Kitchen
9687a8d830
Added cross platform lockout payload 2019-01-16 17:57:32 -08:00
Darren Kitchen
d386f07d8e
Added wallpaper prank payload re: Hak5 episode 2502 2019-01-09 10:58:36 -08:00
Darren Kitchen
820576a103
Updated title 2019-01-01 14:37:25 -08:00
Darren Kitchen
e61d58d488
Added the cross platform continuous locker payload 2019-01-01 14:36:44 -08:00
Eric Briese
e0c355da0a Changed options to be in payload.txt per best practices 2018-12-29 22:51:23 +10:00
Eric
e527ab16a5
Moved screen height and width to config file. 2018-12-29 22:27:19 +10:00
TheG3ntl3man
aac697e89a
Adding Delay
You must add a delay after RUN WIN cmd or it won't always write on the cmd
2018-08-05 10:33:50 -04:00
Mathew Fleisch
ae176d1d14
Two stage mac (#2)
* Add init payload files
* Unhide hidden files after copy. bug fixes
* update readme
2018-07-07 12:32:44 -07:00