421 Commits

Author SHA1 Message Date
0iphor13
91a280d62d
Update README.md 2021-12-11 19:58:22 +01:00
0iphor13
60f9b361f3
Uploaded pingUinBunny
A reverse shell using icmp
2021-12-11 19:56:59 +01:00
0iphor13
f019d862cd
Delete payloads/library/remote_access/switch1 directory 2021-12-11 19:56:06 +01:00
0iphor13
12641377aa
Uploaded pingUinBunny
a reverse shell using icmp
2021-12-11 19:55:11 +01:00
0iphor13
82592d435d
Merge branch 'hak5:master' into master 2021-12-11 19:54:07 +01:00
0iphor13
54505507b9
Updated ReverseBunny to version 1.2 (#475)
* Uploaded ReverseBunny

Obfuscated reverse shell via powershell

* Uploaded WifiSnatch

Get your targets stored wifi information and credentials, store them on your Bashbunny and hop away 🐇

* Update ReverseBunny.txt

Changed payload to evade Windows Defender

* Update payload.txt

Added new "Eject Method" - props to Night(9o3)

* Update README.md

* Deleted ReverseBunny.txt

Deleted because of higher risk to get caught by AV

* Updated ReverseBunny to version 1.2

Updated ReverseBunny to version 1.2.
- Deleted payload on disk because of AV
- Added custom shell design

* Updated ReverseBunny to version 1.2

Updated README for ReverseBunny update

* Updated payload

fixed some stupid left overs <3
2021-12-06 20:08:42 +00:00
0iphor13
97ef0d9173
Updated payload
fixed some stupid left overs <3
2021-11-29 17:59:25 +01:00
0iphor13
863a47d90f
Updated ReverseBunny to version 1.2
Updated README for ReverseBunny update
2021-11-29 17:56:03 +01:00
0iphor13
da3c27ddea
Updated ReverseBunny to version 1.2
Updated ReverseBunny to version 1.2.
- Deleted payload on disk because of AV
- Added custom shell design
2021-11-29 17:52:03 +01:00
0iphor13
3fc0d9c857
Deleted ReverseBunny.txt
Deleted because of higher risk to get caught by AV
2021-11-29 17:43:12 +01:00
0iphor13
dc885ce85c
Merge branch 'hak5:master' into master 2021-10-10 14:42:03 +02:00
0iphor13
86c989f9a0
Updated ReverseBunny (#469)
* Uploaded ReverseBunny

Obfuscated reverse shell via powershell

* Uploaded WifiSnatch

Get your targets stored wifi information and credentials, store them on your Bashbunny and hop away 🐇

* Update ReverseBunny.txt

Changed payload to evade Windows Defender

* Update payload.txt

Added new "Eject Method" - props to Night(9o3)

* Update README.md
2021-10-02 14:58:58 -05:00
xhico
78eb6e3828
Wallpaper Changer (#245) 2021-10-02 13:25:34 -05:00
0iphor13
43b27d6079
Update README.md 2021-10-01 11:56:03 +02:00
0iphor13
a74596db96
Update payload.txt
Added new "Eject Method" - props to Night(9o3)
2021-10-01 11:54:47 +02:00
0iphor13
d00bedd4d6
Update ReverseBunny.txt
Changed payload to evade Windows Defender
2021-10-01 11:52:00 +02:00
0iphor13
7916247ac0
Merge branch 'hak5:master' into master 2021-10-01 11:50:10 +02:00
HackingMark
ee97a0820d
USB Exfiltration Payload with Win10 Fake Update V020821 (#455)
* USB Exfiltration Payload with Win10 Fake Update

This Payload exfiltrates defined files to the Bunny. While copying is in progress, it shows a Fake Win10 Update Screen and removes traces. When it's ready, the target machine is forced to reboot.

* Correction for the Key injection F11

* Create test

* Delete payloads/library/USB_Exfil_with_Fake_Update _and_force-reboot directory

* Create tst

* Add files via upload

* Delete tst

* Delete payloads/library/exfiltration/USB Exfil with Fake Update and force reboot directory
2021-09-30 17:08:02 -05:00
0iphor13
4627e1795b
Merge branch 'hak5:master' into master 2021-09-25 13:08:56 +02:00
0iphor13
e79e39f95d
WifiSnatch (#468)
* Uploaded ReverseBunny

Obfuscated reverse shell via powershell

* Uploaded WifiSnatch

Get your targets stored wifi information and credentials, store them on your Bashbunny and hop away 🐇
2021-09-24 12:41:15 -05:00
0iphor13
4f46f9acfa
Uploaded WifiSnatch
Get your targets stored wifi information and credentials, store them on your Bashbunny and hop away 🐇
2021-09-24 18:05:49 +02:00
0iphor13
205e744f25
Merge branch 'hak5:master' into master 2021-09-24 17:52:52 +02:00
0iphor13
80c724ad99
Uploaded ReverseBunny (#464)
Obfuscated reverse shell via powershell
2021-09-10 20:36:12 +01:00
kuyaya
702deda619
Extending ch.json (#467)
* Update ch.json

* Update ch.json

fixing indentation

* Update ch.json (alt-gr)

replacing "ALT GR" with "ALT-GR"
2021-09-10 20:34:24 +01:00
panicacid
8fa093b67e
New Payload Pineapple-Connect-Windows (#439)
* New Payload

Added new PrintNightmare Payload (Quick and dirty)

* Fixed my potty mouth

I'm a child sometimes

* Renamed Payload

* PrintNightmare: Use SWITCH_POSITION in payload path

* Fixing a typo

* Added Delays

Added some delays due to the fact that it was inconsistently reliable, occasionally it'd half type out the command. The delays have resolved the consistency issue on my end. Feel free to tweak as required.

* Amending Version Number

I'm a fool

* Updated Readme with proper credit

* Housekeeping

Moved some of the QUACK Powershell commands into the juicybit.txt file for speed and ease of use.

* Update README.md

* More improvement

Added exit to the juicybits rather than using alt  and /noprofile to the run as

* Update README.md

* Pineapple-Connect-Windows New Payload For Connecting Client To Pineapple AP / Any AP

Pineapple-Connect-Windows new Bashbunny payload for connecting target machine quickly and efficiently to your Pineapple AP or an AP of your choosing (and control!)

* Changed from RUN WIN to QUACK STRING

Changed from RUN WIN to QUACK STRING as I was having issues with the formatting, presume it needs wrapping in quotes or something but it just kept breaking. QUACK STRING works fine so meh

* Added command to cover traks at the end of the script

added a line of powershell to clean out the run registry key to hide any evidence of the script running

Co-authored-by: Marc <foxtrot@malloc.me>
Co-authored-by: Marc <foxtrot@realloc.me>
2021-09-09 14:45:26 -05:00
0iphor13
ee8aa1e66e
Merge branch 'hak5:master' into master 2021-09-09 16:58:06 +02:00
Darren Kitchen
904e0de1e1
Update README.md
Added contributing section
2021-09-08 16:43:19 -05:00
Darren Kitchen
b621491cc9
Fixed broken links 2021-09-08 15:34:45 -05:00
0iphor13
c652e2e131
Uploaded ReverseBunny
Obfuscated reverse shell via powershell
2021-09-07 18:37:22 +02:00
cribb-it
3fb08e01ae
New Payload - ANSI Sebs cow (#460)
* New Payload - ANSI Sebs cow

* Update Cow

* Making the cow symmetrical
2021-08-24 20:31:02 +01:00
9o3
605b7f1cab
New payload: HiveNightmare (#462)
Leverages CVE-2021–36934 to get SAM/SYSTEM/SECURITY hives.
2021-08-24 20:30:47 +01:00
emptyhen
9fdacee185
New Payload: Razer System Shell (#463)
Exploit Razer USA HID driver installation to System authority PowerShell. 
This is heavily based on Tweet by @_MG_ on 22nd Aug 2021 but modified to work with BashBunny
2021-08-24 20:30:24 +01:00
Darren Kitchen
9b86d8c991 cleaned up directory structure to match payloads.hak5.org 2021-08-24 10:04:24 -05:00
Darren Kitchen
1b042f6f2d Moved sFTP Directory Grabber payload to recon directory 2021-08-24 09:38:52 -05:00
9o3
1efd6a1116
ATNT update: working version (#461)
* Delete stage3.ps1

* Update ATNT to work as intended.

Update ATNT to work as intended. Requires reboot or logoff to fully register AT.

* Remove DONE file in cleanup.

Forgot to remove DONE file.  Now also makes sure this file does not exist before running.
2021-08-18 10:37:59 -05:00
TW-D
4f6cd4b54d
Execution - Get System (#446)
Disable "PowerShell" logging
Check if current process have "Administrator" privilege
Check "SeDebugPrivilege" policy
Retrieves the processes belonging to the "SYSTEM" account
For each system PID, test to obtain the "SYSTEM" account via the parent process
2021-08-16 07:43:01 -05:00
cribb-it
49dff6e659
Fixing my bad spelling (#457) 2021-08-12 15:32:45 +01:00
9o3
9c55288403
New payload ATNT; Ease of Access Assistive Technology (#454)
Uses Windows Ease of Access Assistive Technology (https://docs.microsoft.com/en-us/windows/win32/winauto/ease-of-access---assistive-technology-registration) 
to persistently run code with NT AUTHORITY\SYSTEM rights.
2021-08-11 09:47:17 -05:00
Darren Kitchen
66bc18cbe2
Added bluetooth geofence profiler payload 2021-08-07 11:39:24 -05:00
Mark Brown
a61b1e603e
update discord link (#441) 2021-07-12 20:42:38 +01:00
cribb-it
785e5d2a75
Various small fixes (#435)
* Add files via upload

* Update readme.md

* Update readme.md

* Update payload.txt

* Update readme.md

* fix rebase errors

* Fix for rebase

* Fix for fewer details
2021-07-06 20:02:27 +01:00
panicacid
babdc72743
General Imrovements to PrintNightmare (#434)
* Housekeeping

Moved some of the QUACK Powershell commands into the juicybit.txt file for speed and ease of use.

* Update README.md

* More improvement

Added exit to the juicybits rather than using alt  and /noprofile to the run as

* Update README.md

Co-authored-by: Marc <foxtrot@realloc.me>
2021-07-05 16:36:42 +01:00
panicacid
efb5f63ad8
Bugfix (#433)
* New Payload

Added new PrintNightmare Payload (Quick and dirty)

* Fixed my potty mouth

I'm a child sometimes

* Renamed Payload

* PrintNightmare: Use SWITCH_POSITION in payload path

* Fixing a typo

* Added Delays

Added some delays due to the fact that it was inconsistently reliable, occasionally it'd half type out the command. The delays have resolved the consistency issue on my end. Feel free to tweak as required.

* Amending Version Number

I'm a fool

* Updated Readme with proper credit

Co-authored-by: Marc <foxtrot@malloc.me>
2021-07-05 02:33:36 +01:00
panicacid
73ca91c3ba
Quick and Dirty PrintNightmare Payload (#432)
* New Payload

Added new PrintNightmare Payload (Quick and dirty)

* Fixed my potty mouth

I'm a child sometimes

* Renamed Payload

* PrintNightmare: Use SWITCH_POSITION in payload path

* Fixing a typo

Co-authored-by: Marc <foxtrot@malloc.me>
2021-07-05 01:27:46 +01:00
Marc
829a4db6b2
Extensions: Add wait_for BTLE extensions 2021-07-01 16:29:44 +01:00
cribb-it
8cd8d859cd
New Payload: Win_PoSH_WordReport, Fix typos in Win_PoSH_FakeLoginScreen (#431)
* Add files via upload

* Update readme.md

* Update payload.txt

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Add files via upload

* Update readme.md

* Update readme.md

* Add Payload WIN_PoSH_HKU_RegBackUp

* Update readme.md

* Update payload.txt

* Change for admin shell

* Update readme.md

* Update payload.txt

* Update payload.txt

* Update readme.md

* Added payload WIN_PoSH_SaveSecurityHive

Added new payload to exfiltration that saves the HKLM security hive to the bunny

* Morse Code File Exfiltration

A bit pointless with limitation of morse code but I thought it was fun to create.

* Update readme.md

* Update for non-alphanumeric

* Update for timing

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update payload.txt

* New payload - Fake Login

Shows a fake version of the windows 10 login screen

* Update readme.md

* Changes to Fake Login Payload

* Changes to Fake Login

* Win_PoSH_FakeLogin: Changes to payload and readme

* New recon payload: Win_PoSH_WordReport

* Update fixed typo: Win_PoSH_WordReport
2021-04-30 17:02:21 +01:00
Marc
7a0d036b74
Win_PoSH_FakeLogin: Fix typo in LED command. 2021-04-24 01:31:18 +01:00
cribb-it
6375315a33
Update PoSH_Morsecode, Add Windows 10 Login Screen (#430)
* Add files via upload

* Update readme.md

* Update payload.txt

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Add files via upload

* Update readme.md

* Update readme.md

* Add Payload WIN_PoSH_HKU_RegBackUp

* Update readme.md

* Update payload.txt

* Change for admin shell

* Update readme.md

* Update payload.txt

* Update payload.txt

* Update readme.md

* Added payload WIN_PoSH_SaveSecurityHive

Added new payload to exfiltration that saves the HKLM security hive to the bunny

* Morse Code File Exfiltration

A bit pointless with limitation of morse code but I thought it was fun to create.

* Update readme.md

* Update for non-alphanumeric

* Update for timing

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update payload.txt

* New payload - Fake Login

Shows a fake version of the windows 10 login screen

* Update readme.md

* Changes to Fake Login Payload

* Changes to Fake Login
2021-04-22 16:44:33 +01:00
cribb-it
27d63ad5a5
Morse Code File Exfiltration (#429)
* Add files via upload

* Update readme.md

* Update payload.txt

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Add files via upload

* Update readme.md

* Update readme.md

* Add Payload WIN_PoSH_HKU_RegBackUp

* Update readme.md

* Update payload.txt

* Change for admin shell

* Update readme.md

* Update payload.txt

* Update payload.txt

* Update readme.md

* Added payload WIN_PoSH_SaveSecurityHive

Added new payload to exfiltration that saves the HKLM security hive to the bunny

* Morse Code File Exfiltration

A bit pointless with limitation of morse code but I thought it was fun to create.

* Update readme.md

* Update for non-alphanumeric

* Update for timing

* Update readme.md
2021-04-04 09:33:48 -07:00
Ian Costa
e9916c88aa
Windows Powershell Local DNS Poisoning payload (#427)
* Created Powershell_Local_DNS_Poisoning payload

* Fixed README.md formatting
2021-01-11 08:43:00 -08:00