42 Commits

Author SHA1 Message Date
0iphor13
d4e77cb241
Update payload.txt 2021-12-23 13:27:30 +01:00
0iphor13
7308488961
Rename payloads/library/remote_access/pingUinBunny/payload.txt to payloads/library/remote_access/PingZhellBunny/payload.txt 2021-12-23 13:21:17 +01:00
0iphor13
b71cf71651
Rename payloads/library/remote_access/pingUinBunny/README.md to payloads/library/remote_access/PingZhellBunny/README.md 2021-12-23 13:20:57 +01:00
0iphor13
496ab3ea23
Rename payloads/library/remote_access/pingUinBunny/PingZhell.ps1 to payloads/library/remote_access/PingZhellBunny/PingZhell.ps1 2021-12-23 13:20:29 +01:00
0iphor13
9a8d6113a0
Rename payloads/library/remote_access/pingUinBunny/Bunny.pl to payloads/library/remote_access/PingZhellBunny/Bunny.pl 2021-12-23 13:19:46 +01:00
0iphor13
2ce8e8f034
Update payload.txt 2021-12-23 13:16:42 +01:00
0iphor13
979bdbc179
Update README.md 2021-12-23 13:12:32 +01:00
0iphor13
c19b9e56f6
Update README.md 2021-12-23 13:12:21 +01:00
0iphor13
712ebe762c
Update Bunny.pl 2021-12-23 13:10:55 +01:00
0iphor13
27b1cd003e
Updated to PingZhell 2021-12-23 13:09:32 +01:00
0iphor13
567040f9e7
Update README.md 2021-12-11 20:02:51 +01:00
0iphor13
91a280d62d
Update README.md 2021-12-11 19:58:22 +01:00
0iphor13
60f9b361f3
Uploaded pingUinBunny
A reverse shell using icmp
2021-12-11 19:56:59 +01:00
0iphor13
f019d862cd
Delete payloads/library/remote_access/switch1 directory 2021-12-11 19:56:06 +01:00
0iphor13
12641377aa
Uploaded pingUinBunny
a reverse shell using icmp
2021-12-11 19:55:11 +01:00
0iphor13
97ef0d9173
Updated payload
fixed some stupid left overs <3
2021-11-29 17:59:25 +01:00
0iphor13
863a47d90f
Updated ReverseBunny to version 1.2
Updated README for ReverseBunny update
2021-11-29 17:56:03 +01:00
0iphor13
da3c27ddea
Updated ReverseBunny to version 1.2
Updated ReverseBunny to version 1.2.
- Deleted payload on disk because of AV
- Added custom shell design
2021-11-29 17:52:03 +01:00
0iphor13
3fc0d9c857
Deleted ReverseBunny.txt
Deleted because of higher risk to get caught by AV
2021-11-29 17:43:12 +01:00
0iphor13
43b27d6079
Update README.md 2021-10-01 11:56:03 +02:00
0iphor13
a74596db96
Update payload.txt
Added new "Eject Method" - props to Night(9o3)
2021-10-01 11:54:47 +02:00
0iphor13
d00bedd4d6
Update ReverseBunny.txt
Changed payload to evade Windows Defender
2021-10-01 11:52:00 +02:00
0iphor13
c652e2e131
Uploaded ReverseBunny
Obfuscated reverse shell via powershell
2021-09-07 18:37:22 +02:00
Mike Galvin
f1bf173d22 Enable RDP, disable NLA, log network information. (#401) 2019-10-19 12:36:45 -07:00
Marc
f9aadb0a4d
Merge pull request #339 from JamesCullum/master
Updated RaZ_ReverseShell
2019-06-28 00:25:07 +00:00
metalkey
ee48a74dc6 Added readme (#337)
Updated author details
2018-06-04 13:31:43 +10:00
James Cullum (Pseudonym)
33ba79d692 Updated RaZ_ReverseShell
- Clean up traces
- Bugfixes on newer firmware
- Improved documentation
- Fake hardware identifier
- Added persistence via autostart
- Disconnect on end
2018-04-16 22:57:50 +02:00
metalkey
65d652a15c Add Hershell Encrypted Reverse shell payload (#335) 2018-04-11 21:21:40 +10:00
Tudor Gheorghiu
9011db7fae Update unicorn readme.md (#302) 2018-01-28 10:27:46 +11:00
KeenanV
7f902403d4 Persistent Reverse Shells for MacOS and Windows 10 (#306) 2018-01-22 10:39:14 +11:00
Wesley
a48d9e2a61 Updated "Linux Reverse Shell" to v1.2 (#262) 2017-11-22 09:59:18 +11:00
Prodicode
e0abae7179 Added Powershell injection script with Unicorn payload. (#288) 2017-11-22 09:51:59 +11:00
Aidan Holland
5a77792c1d Update and fix payloads (#277)
* Updated all Payloads for Version 1.2+

Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248)
Removed all mention of DUCKY_LANG (Issue #248)
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273

* Fixed e.cmd

* Fix e.cmd pt2

* Fixed Issues

Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
subinacls
a487d0a5db Added JavaScript Reverse Meterpreter payload (#217)
* Create JSRevMeter

* Update JSRevMeter

* Update JSRevMeter

* Update JSRevMeter

* Update JSRevMeter

* Update JSRevMeter

* Update JSRevMeter

* Update JSRevMeter

* Update JSRevMeter

final version before pull request

* Update JSRevMeter

* Update JSRevMeter

* Update JSRevMeter

had to chop up the shellcode so it would echo properly to file, overly long strings terminated premature

* Create Readme.md

* Update Readme.md

* Update Readme.md

* Update Readme.md

* Update Readme.md

* Update JSRevMeter

* Update Readme.md

* Update Readme.md

* Update Readme.md

* Rename JSRevMeter to payload.txt
2017-05-18 14:56:15 +10:00
Kyle Hoehn
9c527c29c4 Added USB Intruder payload (#220)
* USB Intruder

Initial upload of the USB Intruder v1.1

Tested on Windows 7 and Windows 10.

* USB Intruder

Updated Readme.

Forgot to add a line.

* Update...again...

Added link for forum comments/discussion.

* USB Intruder

USB Intruder v1.1 Commit.
2017-05-18 14:52:54 +10:00
David
d02d25d2b6 Add initial readme to UndercoverBunny (#211) 2017-05-02 19:02:05 -07:00
Sebastian Kinne
744165b31e
Added config.txt with default values and removed all references of DUCKY_LANG from existing payloads 2017-05-01 12:11:20 +10:00
RalphyZ
750d384df7 Updated payloads for fw v1.1 (#176)
* Mac Reverse Shell

Starts a terminal window on a Mac,then creates a bash reverse shell inside a script, s.sh.  It then runs the script in the background and closes the terminal window.

* Added variables for IP and Port of the Netcat Listener

For ease of use, variables were added at the top for the IP Address and Port of the Netcat Listener.  Change those values to your listener and no other edits should be needed.

* Added persistence (and a reason to have a dropper)

This payload creates a bash reverse shell inside a script and adds persistence by adding the script to the Mac Launch Agent at a user defined interval.

* Mac Reverse Shell

Starts a terminal window on a Mac,then creates a bash reverse shell inside a script, s.sh.  It then runs the script in the background and closes the terminal window.

* Added variables for IP and Port of the Netcat Listener

For ease of use, variables were added at the top for the IP Address and Port of the Netcat Listener.  Change those values to your listener and no other edits should be needed.

* Added persistence (and a reason to have a dropper)

This payload creates a bash reverse shell inside a script and adds persistence by adding the script to the Mac Launch Agent at a user defined interval.

* Fixed additional MacReverseShell

* Added readme.md files

* Added readme.md files

* Added readme.md

* Added readme.md files

* Added readme.md files

* Updated for firmware 1.1

* Updated for firmware 1.1

* Added ThemeChanger and updated for firmware 1.1

* Updated readme.md

* Updated for firmware 1.1 - using RUN command

* Fixed issues with the new RUN - reverted

* Fixed a few script problems

* removed binary and updated readme.md

* added a check for themepack

* edited themechanger readme

* updated readme.md and version
2017-04-29 08:49:35 +10:00
hkessel1
e06b42b328 Create Undercover Bunny
Undercover bunny is a Bash Bunny script that creates a wifi network when connected using the hosts internet connection.

Added LED's

Update Undercover Bunny

Rename Undercover Bunny to payload.txt

Moved UndercoverBunny into the correct payload folder
2017-04-17 10:00:18 +10:00
0xCoto
7c1a4a30f2 Updated SingleSecondShell for Bash Bunny v1.1 (#179) 2017-04-16 18:15:38 +10:00
Wesley
7f1172849b Updated LinuxReverseShell for BashBunny Fw v1.1 (#164) 2017-04-10 15:38:02 +10:00
Sebastian Kinne
85b1bc7aca
Cleanup: Sort payloads by category 2017-04-10 13:29:17 +10:00