46 Commits

Author SHA1 Message Date
afsh4ck
0e8dc65a3b
Update payload.txt 2023-06-12 12:33:02 +02:00
afsh4ck
37a4d9b42e
Update of MacPhotoExfill & Create MacDocsExfill (#588)
* Update readme.md

* Update payload.txt

* Create MacDocsExfill

* Delete MacDocsExfill

* Add files via upload
2023-06-09 20:03:32 -05:00
afsh4ck
e2b0e495b3
Exfilter all the images from the principal folders on unlocked MacOS targets. 2023-06-02 12:49:10 +02:00
atomic
e8e2103c36
Add files via upload 2022-11-14 22:41:01 -05:00
atomic
5dba64108f
Add files via upload 2022-11-02 23:10:25 -04:00
atomic
0f3b7db81d
Add files via upload 2022-10-29 12:37:42 -04:00
atomic
85ecdd5889
Add files via upload 2022-10-10 23:10:33 -04:00
hak5glytch
8f19915a5f
Merge pull request #546 from atomiczsec/master
New Payload - Copy-And-Waste
2022-10-09 11:57:16 -06:00
hak5glytch
7892015c02
Merge pull request #550 from Jeklah/patch-1
Update BBB.ps1
2022-10-08 18:39:25 -06:00
atomic
a08e9b382d
New Payload - Screen-Shock (#552)
* Add files via upload

* Update c.ps1

* Add files via upload
2022-10-08 18:32:28 -06:00
Jeklah
3e608cdd3d
Update BBB.ps1
Typo in comments, Chrome should be Edge.
2022-09-06 23:32:19 +01:00
atomic
f864ad8323
Merge branch 'hak5:master' into master 2022-08-30 18:39:55 -04:00
atomic
8e322706bc
New payload - Bookmark-Hog (#543) 2022-08-30 09:56:42 -05:00
Carey Balboa
2aa4910d0c
add my own exfil payload (#540)
* add my own exfil payload

Exfiltrates files from logged in users Documents and Desktop folders

* updated

* Update readme.md
2022-08-30 09:28:28 -05:00
atomic
a59fbe93c7
Add files via upload 2022-08-23 21:44:25 -04:00
PeteDavis91
ca22cb3c37
OooohThatsHandy - Juicy Data Grabber (#538)
* Add files via upload

* Rename Read-Me.txt to Read-Me

* Rename payload.txt.txt to payload

* Add files via upload

Added some features and fixed a few bugs I found

* Delete payload

* Rename payload.txt.txt to payload
2022-07-14 14:25:28 -05:00
Ferrari
cae94215c7
Update x.cmd (#536)
If google chrome is installed, download the history.
2022-07-14 14:22:18 -05:00
drapl0n
b59823da1e
Uploading BLE_EXFIL extension (#519)
* Uploaded BunnyLogger

* uploading payload intel

* Create README.md

* Update README.md

* uploaded LinuxPreter

* uploaded FileRipper

Faster executing version

* Update README.md

* fixing typo

* uploaded sudoSnatch

* Update README.md

* deleting sudoSnatch

* uploading payload

* Delete payload.sh

* Delete shell

* Delete systemBus

* Delete camPeek directory

* Update payload.sh

* Update payload.sh

* Delete payloads/library/execution/FileRipper directory

* Update payload.sh

* Update payload.sh

* Update payload.sh

* Update payload.sh

* uploading BLE_EXFIL extension

BLE_EXFIL extension, exfiltrates data via BLE

* BLE_EXFIL demo
2022-05-02 16:47:53 -05:00
cribb-it
3f41494153
New Payload - KeyManger Backup (#517)
* New Payload - KeyManger Backup

* Update Desc
2022-04-20 14:04:44 -05:00
drapl0n
46d069c0a9
uploaded imagesOfYore (#510)
* uploaded imagesOfYore

imagesOfYore payload steals every image that target ever had in his disk.

* Delete payload.txt

* uploading imagesOfYore
2022-04-08 09:25:24 -05:00
drapl0n tuxed0
2785fbc4db
Uploading payload "intel(intelligence)" (#501)
* Uploaded BunnyLogger

* uploading payload intel

* Create README.md

* Update README.md
2022-03-08 11:22:58 -06:00
0iphor13
5eaf7d9dc7
Uploaded HashDumpBunny + some fixes (#491)
* Uploaded ReverseBunny

Obfuscated reverse shell via powershell

* Uploaded WifiSnatch

Get your targets stored wifi information and credentials, store them on your Bashbunny and hop away 🐇

* Update ReverseBunny.txt

Changed payload to evade Windows Defender

* Update payload.txt

Added new "Eject Method" - props to Night(9o3)

* Update README.md

* Deleted ReverseBunny.txt

Deleted because of higher risk to get caught by AV

* Updated ReverseBunny to version 1.2

Updated ReverseBunny to version 1.2.
- Deleted payload on disk because of AV
- Added custom shell design

* Updated ReverseBunny to version 1.2

Updated README for ReverseBunny update

* Updated payload

fixed some stupid left overs <3

* Uploaded pingUinBunny

a reverse shell using icmp

* Delete payloads/library/remote_access/switch1 directory

* Uploaded pingUinBunny

A reverse shell using icmp

* Update README.md

* Update README.md

* Updated to PingZhell

* Update Bunny.pl

* Update README.md

* Update README.md

* Update payload.txt

* Rename payloads/library/remote_access/pingUinBunny/Bunny.pl to payloads/library/remote_access/PingZhellBunny/Bunny.pl

* Rename payloads/library/remote_access/pingUinBunny/PingZhell.ps1 to payloads/library/remote_access/PingZhellBunny/PingZhell.ps1

* Rename payloads/library/remote_access/pingUinBunny/README.md to payloads/library/remote_access/PingZhellBunny/README.md

* Rename payloads/library/remote_access/pingUinBunny/payload.txt to payloads/library/remote_access/PingZhellBunny/payload.txt

* Update payload.txt

* Update README.md

* Update README.md

* Update Bunny.pl

* Created ProcDumpBunny

Dump lsass.exe with a renamed version of procdump and get the users hashes with Mimikatz

* Update README.md

* Update payload.txt

* Updated ReverseBunny

Fixed wrong DELAY commands

* Updated PingZhellBunny

Fixed wrong DELAY commands

* Updated WifiSnatch

Fixed multiple mistakes

* Uploaded HashDumpBunny

Use your BashBunny to dump the user hashes of your target - similar to the msf post-module.
The script was obfuscated with multiple layers, so don't be confused.
If you don't trust this script, run it within a save testing space - which should be best practice anyways ;)

* added example picture

* Update README.md
2022-02-02 09:09:37 -06:00
Jake Wimmer
4c1c8d47cd
Initial commit (#484) 2022-01-19 13:32:58 -06:00
cribb-it
8a7606aa0a
New Payload - Read It Out (#444) 2021-12-21 17:28:38 -06:00
TW-D
5d4367787f
SanDisk Wireless Stick Exfiltration (#445)
Uses the "SanDisk Wireless Stick" for files exfiltration.
1) Avoids "PowerShell Script Block Logging".
2) Hide "PowerShell" window.
3) Deletes Wi-Fi connection profiles in automatic mode, each deletion causes a disconnection.
4) Adds the profile for the "SanDisk Connect Wireless Stick" in automatic mode.
5) Checks whether the Wi-Fi interface is connected to the "SanDisk" and whether the gateway can be reached, if not, automatically starts again.
6) Exfiltration of the files via the HTTP channel.
2021-12-21 17:24:09 -06:00
saintcrossbow
bb601883ef
New Exfiltration Payload: Smart Data Thief (#453)
* Exfiltrate using Windows utility SmartFileExtract

Script to find all files that a) have filenames with the word "pass" or "secret" in them or b) are standard .DOC files and copy them to loot. SmartFileExtract is used to kill the copy after 500 MBs and / or 90 seconds and will display the copy status using a fake install window.

Dependencies:
Binary (SmartFileExtract.exe) from https://github.com/saintcrossbow/SmartFileExtract

* New Exfiltration: Smart Data Thief

Timed exfiltration attack targeting high value data and WiFi creds. Highly configurable to start / stop attack using BLE beacons, create distraction when aborting attack, and full shutdown for removal after attack complete.

* Revolver BLE controlled multi-attack

New payload: Revolver - a multi option attack controlled by BLE beacons. Plug in Bash Bunny and choose your attack based on what you need in the field.
2021-12-21 17:11:50 -06:00
HackingMark
ee97a0820d
USB Exfiltration Payload with Win10 Fake Update V020821 (#455)
* USB Exfiltration Payload with Win10 Fake Update

This Payload exfiltrates defined files to the Bunny. While copying is in progress, it shows a Fake Win10 Update Screen and removes traces. When it's ready, the target machine is forced to reboot.

* Correction for the Key injection F11

* Create test

* Delete payloads/library/USB_Exfil_with_Fake_Update _and_force-reboot directory

* Create tst

* Add files via upload

* Delete tst

* Delete payloads/library/exfiltration/USB Exfil with Fake Update and force reboot directory
2021-09-30 17:08:02 -05:00
0iphor13
e79e39f95d
WifiSnatch (#468)
* Uploaded ReverseBunny

Obfuscated reverse shell via powershell

* Uploaded WifiSnatch

Get your targets stored wifi information and credentials, store them on your Bashbunny and hop away 🐇
2021-09-24 12:41:15 -05:00
9o3
605b7f1cab
New payload: HiveNightmare (#462)
Leverages CVE-2021–36934 to get SAM/SYSTEM/SECURITY hives.
2021-08-24 20:30:47 +01:00
cribb-it
3904f165d9
Added new payload WIN_PoSH_HKU_RegBackUp (#424)
* Add files via upload

* Update readme.md

* Update payload.txt

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Add files via upload

* Update readme.md

* Update readme.md

* Add Payload WIN_PoSH_HKU_RegBackUp

* Update readme.md

* Update payload.txt

* Change for admin shell

* Update readme.md

* Update payload.txt

* Update payload.txt

* Update readme.md

* Added payload WIN_PoSH_SaveSecurityHive

Added new payload to exfiltration that saves the HKLM security hive to the bunny
2020-12-14 23:53:42 +00:00
Marc
e82fb6166b
Merge pull request #347 from mathew-fleisch/master
Two Stage Mac Payload
2019-06-28 20:20:33 +00:00
Darren Kitchen
d341068548
Added dropbox exfiltrator PoC payload 2019-01-30 12:17:55 -08:00
Mathew Fleisch
ae176d1d14
Two stage mac (#2)
* Add init payload files
* Unhide hidden files after copy. bug fixes
* update readme
2018-07-07 12:32:44 -07:00
bg-wa
920ff7fa67 New options for optical exfil payload (#317) 2018-01-28 10:24:58 +11:00
bg-wa
81e6d536dd Added Optical Exfiltration Payload (#316) 2018-01-27 15:47:39 +11:00
danthegoodman1
6fa5887aae Addition of Exfiltration payload (#300) 2017-12-12 19:11:25 +11:00
saintcrossbow
08c24c4389 Added SmartFileExtract payload (#296) 2017-11-27 12:16:17 +11:00
Aidan Holland
5a77792c1d Update and fix payloads (#277)
* Updated all Payloads for Version 1.2+

Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248)
Removed all mention of DUCKY_LANG (Issue #248)
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273

* Fixed e.cmd

* Fix e.cmd pt2

* Fixed Issues

Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
Bry-fi
4165a2dda9 Updated browserData payload for firmware v1.1+ (#185)
* Fixed for 1.0 and 1.1

Fixed the payload for 1.0 but if you want it ported for 1.1, change line 38 to (LED M)

* Made 1.1 compatible.

Still need to examine Get-BrowserData.ps1
2017-05-02 02:26:32 +10:00
jdetmold
33d62ff9e9 Added MacProfiler payload (#195)
* clean up loot

added sub folder so all files are not in root of loot folder

* MacProfiler

NewPayload for Profiling Mac systems

* Make DIR
2017-04-30 11:19:19 +10:00
Alex Flores
ca9e53c5a8 updates sMacAndGrab for bashbunny fw1.1 (#202) 2017-04-27 13:04:38 +10:00
TheRealNoob
1d95d9bfb8 Updated SMB_Exfiltrator payload to wait for port 445 (SMB) rather than ICMP Ping response (#173) 2017-04-16 18:57:02 +10:00
k1ul3ss
7534270a7a Added MacPDFExfil payload (#186) 2017-04-16 15:53:49 +10:00
Darren Kitchen
b4b23c04f1 Added file sync to smb_exfiltrator payload 2017-04-10 15:54:39 +10:00
Darren Kitchen
bdcbc45c94 Updated smb_exfiltrator payload for Bash Bunny v1.1 2017-04-10 15:50:27 +10:00
Sebastian Kinne
85b1bc7aca
Cleanup: Sort payloads by category 2017-04-10 13:29:17 +10:00