TheDragonkeeper
ca22f20b53
Update payload.txt
2019-04-20 04:48:38 +01:00
TheDragonkeeper
d22c2481a0
Update Readme.md
2019-04-20 04:46:02 +01:00
TheDragonkeeper
63c62a4871
Update Readme.md
2019-04-20 04:34:31 +01:00
TheDragonkeeper
81b4e060c8
Update Readme.md
2019-04-20 04:33:15 +01:00
TheDragonkeeper
a9b191045b
added all auth options
2019-04-20 03:59:41 +01:00
TheDragonkeeper
cda2430080
ChromeOS Enrolment Payload
2019-04-06 03:14:38 +01:00
G4te-Keep3r
502576d7ed
Made ALTCODE-TRANSCODER. ( #373 )
...
* Response to Hak5 2506
* A random 'e' ended up on line 58.
Line is blank now like it is supposed to be.
* Created readme
STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen
b1309229cc
Added ALTCODE demo payload
2019-02-06 18:19:47 -08:00
Darren Kitchen
d341068548
Added dropbox exfiltrator PoC payload
2019-01-30 12:17:55 -08:00
Rosius Yves
0ee25f8d0d
Update payload.txt ( #365 )
...
Some more shortening. Only 183 characters!
powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"
* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen
0273c87be2
Added key code spammer test payload
2019-01-22 23:22:21 -08:00
0rion
fed24a87b4
Update Info.ps1
...
Gets COM& Serial Device PID&VID if doing a walk about and want to collect info on HID/PID&VID + MI for future use. just a thought
#Get - Com & Serial Devices
$COMDevices = Get-Wmiobject Win32_USBControllerDevice | ForEach-Object{[Wmi]($_.Dependent)} | Select-Object Name, DeviceID, Manufacturer | Sort-Object -Descending Name | Format-Table
"COM & SERIAL DEVICES"
"==================================================================" + ($COMDevices | Out-String)
""
2019-01-17 19:29:40 -07:00
0rion
9777ae0fee
Update for Info.ps1
...
Removes all Variables created during the session. I noticed my version of PS was storing them between simulated attacks. so removing them entirely was my resolve.
Remove-Variable -Name computerPubIP,
computerIP,IsDHCPEnabled,Network,Networks,
computerMAC,computerSystem,computerBIOS,computerOs,
computerCpu, computerMainboard,computerRamCapacity,
computerRam,driveType,Hdds,RDP,WLANProfileNames,WLANProfileName,
Output,WLANProfileObjects,WLANProfilePassword,WLANProfileObject,luser,
process,listener,listenerItem,process,service,software,drivers,videocard,
vault -ErrorAction SilentlyContinue -Force
2019-01-17 19:21:02 -07:00
Darren Kitchen
9687a8d830
Added cross platform lockout payload
2019-01-16 17:57:32 -08:00
Darren Kitchen
d386f07d8e
Added wallpaper prank payload re: Hak5 episode 2502
2019-01-09 10:58:36 -08:00
Darren Kitchen
820576a103
Updated title
2019-01-01 14:37:25 -08:00
Darren Kitchen
e61d58d488
Added the cross platform continuous locker payload
2019-01-01 14:36:44 -08:00
Eric Briese
e0c355da0a
Changed options to be in payload.txt per best practices
2018-12-29 22:51:23 +10:00
Eric
e527ab16a5
Moved screen height and width to config file.
2018-12-29 22:27:19 +10:00
TheG3ntl3man
aac697e89a
Adding Delay
...
You must add a delay after RUN WIN cmd or it won't always write on the cmd
2018-08-05 10:33:50 -04:00
Mathew Fleisch
ae176d1d14
Two stage mac ( #2 )
...
* Add init payload files
* Unhide hidden files after copy. bug fixes
* update readme
2018-07-07 12:32:44 -07:00
Mathew Fleisch
33b71367c4
Bring up to date
2018-06-23 08:01:42 -07:00
metalkey
ee48a74dc6
Added readme ( #337 )
...
Updated author details
2018-06-04 13:31:43 +10:00
golem445
9fab25740d
Bunnyhound and Quickdraw added ( #343 )
...
* Add files via upload
Initial payload
* Add files via upload
Initial payload
2018-05-20 14:23:53 -07:00
golem445
be78dafbfc
Add files via upload ( #342 )
2018-05-20 11:29:10 -07:00
root
989be5976a
update powershell run line and fix complete check
2018-05-10 13:07:22 -05:00
root
e984278d66
Merge remote-tracking branch 'upstream/master'
2018-05-07 09:35:47 -05:00
James Cullum (Pseudonym)
33ba79d692
Updated RaZ_ReverseShell
...
- Clean up traces
- Bugfixes on newer firmware
- Improved documentation
- Fake hardware identifier
- Added persistence via autostart
- Disconnect on end
2018-04-16 22:57:50 +02:00
metalkey
65d652a15c
Add Hershell Encrypted Reverse shell payload ( #335 )
2018-04-11 21:21:40 +10:00
Tudor Gheorghiu
9011db7fae
Update unicorn readme.md ( #302 )
2018-01-28 10:27:46 +11:00
Alex Flores
6345354375
Added chrome extension installer payload ( #315 )
...
- uses new AUTOETHERNET attackmode
- uses new GET TARGET_OS functionality
- uses new DEBUG function
- uses new MAC_HAPPY extension
2018-01-28 10:26:53 +11:00
bg-wa
920ff7fa67
New options for optical exfil payload ( #317 )
2018-01-28 10:24:58 +11:00
bg-wa
81e6d536dd
Added Optical Exfiltration Payload ( #316 )
2018-01-27 15:47:39 +11:00
KeenanV
7f902403d4
Persistent Reverse Shells for MacOS and Windows 10 ( #306 )
2018-01-22 10:39:14 +11:00
c64whiz
a998f5c86c
Add random interval to InfiniteControl payload ( #310 )
2018-01-22 10:38:38 +11:00
Jonathan Debétaz
940dc09043
Payload updates ( #309 )
2018-01-15 15:36:49 +10:00
root
d978800874
merge upstream
2017-12-19 13:29:12 -06:00
Thorsten Sick
f8a442e66d
Proof-of-concept added: EICAR of bash bunny HID simulation for Linux ( #298 )
2017-12-12 19:12:36 +11:00
danthegoodman1
6fa5887aae
Addition of Exfiltration payload ( #300 )
2017-12-12 19:11:25 +11:00
Thorsten Sick
fae8746466
Added "Info Grabber for Linux" payload ( #299 )
2017-12-08 07:13:14 +11:00
saintcrossbow
08c24c4389
Added SmartFileExtract payload ( #296 )
2017-11-27 12:16:17 +11:00
Trae Horton
53cf608b7f
Add BlueTeamPCAudit payload ( #261 )
2017-11-23 06:32:45 +11:00
Wesley
a48d9e2a61
Updated "Linux Reverse Shell" to v1.2 ( #262 )
2017-11-22 09:59:18 +11:00
Michael Weinstein
00cee07ec0
Added "Bushings blue turtle" payload ( #263 )
2017-11-22 09:54:02 +11:00
Prodicode
e0abae7179
Added Powershell injection script with Unicorn payload. ( #288 )
2017-11-22 09:51:59 +11:00
illwill
3a1b26e9c4
Violation of CoC ( #294 )
...
* removed due to Code Of Conduct
* removed due to violation of Code of Conduct
* Delete md.ps1
* Delete p.ps1
* violation of coc
* Delete server.py
* violation of coc
* Delete payload.txt
* Delete readme.md
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete RR.ps1
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete background.mp3
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete Sherlock.ps1
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
2017-11-20 23:23:52 -08:00
danielgohlke
dbae32c86d
Update win93 prank payload ( #291 )
...
Removed usage fixed browsers and added commands to use the default system browser
2017-11-20 14:21:15 +11:00
Mikee
69cd48ee05
Added Startup-Message payload ( #260 )
2017-11-20 14:20:16 +11:00
ReshephTheGray
d65380bd94
New payload GetServicePerm ( #290 )
2017-11-20 14:16:56 +11:00
RazerBlade
f97b75983d
Updating PasswordGrabber to make it more easily understandble ( #293 )
2017-11-20 14:15:12 +11:00