Mohamed A. Baset
ddffe360a4
Update readme.md
2019-05-30 00:35:55 -05:00
Mohamed A. Baset
bb2c9c5bfd
Create mmcbrute.py
2019-05-30 00:31:56 -05:00
Mohamed A. Baset
4778effde3
Create README.md
2019-05-30 00:31:11 -05:00
Mohamed A. Baset
0ac9056917
Create LICENSE
2019-05-30 00:30:30 -05:00
Mohamed A. Baset
fcac3b6d29
Create userlist.txt
2019-05-30 00:08:51 -05:00
Mohamed A. Baset
031a47b0d2
Create passlist.txt
2019-05-30 00:07:30 -05:00
Mohamed A. Baset
d11515bf59
Create readme.md
2019-05-30 00:05:43 -05:00
Darren Kitchen
36e34feac4
Update payload.txt
2019-05-28 12:42:10 -07:00
Catatonic
c282540f52
Clarying documentation based on user feedback. ( #381 )
2019-05-22 18:46:59 -07:00
Catatonic
f171837db2
Add Jackalope ( #380 )
...
* Adding Jackalope, a Bunny+Metasploit chimera project.
* Fixing inaccurate documentation.
* Generate the password entry payload on the alternate switch.
* Additional documentation concerning alternate payload mechanism.
* Branding
* Update readme.md
* rearchitecting payload to be independent. No longer overwrites alternate payload location. Uses WAIT interface to interact with the tester to reuse a password, clear the password, and re-attack the machine.
2019-05-22 16:53:59 -07:00
G4te-Keep3r
502576d7ed
Made ALTCODE-TRANSCODER. ( #373 )
...
* Response to Hak5 2506
* A random 'e' ended up on line 58.
Line is blank now like it is supposed to be.
* Created readme
STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen
b1309229cc
Added ALTCODE demo payload
2019-02-06 18:19:47 -08:00
Darren Kitchen
d341068548
Added dropbox exfiltrator PoC payload
2019-01-30 12:17:55 -08:00
Rosius Yves
0ee25f8d0d
Update payload.txt ( #365 )
...
Some more shortening. Only 183 characters!
powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"
* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen
0273c87be2
Added key code spammer test payload
2019-01-22 23:22:21 -08:00
Darren Kitchen
9687a8d830
Added cross platform lockout payload
2019-01-16 17:57:32 -08:00
Darren Kitchen
d386f07d8e
Added wallpaper prank payload re: Hak5 episode 2502
2019-01-09 10:58:36 -08:00
Darren Kitchen
820576a103
Updated title
2019-01-01 14:37:25 -08:00
Darren Kitchen
e61d58d488
Added the cross platform continuous locker payload
2019-01-01 14:36:44 -08:00
metalkey
ee48a74dc6
Added readme ( #337 )
...
Updated author details
2018-06-04 13:31:43 +10:00
golem445
9fab25740d
Bunnyhound and Quickdraw added ( #343 )
...
* Add files via upload
Initial payload
* Add files via upload
Initial payload
2018-05-20 14:23:53 -07:00
golem445
be78dafbfc
Add files via upload ( #342 )
2018-05-20 11:29:10 -07:00
metalkey
65d652a15c
Add Hershell Encrypted Reverse shell payload ( #335 )
2018-04-11 21:21:40 +10:00
Tudor Gheorghiu
9011db7fae
Update unicorn readme.md ( #302 )
2018-01-28 10:27:46 +11:00
Alex Flores
6345354375
Added chrome extension installer payload ( #315 )
...
- uses new AUTOETHERNET attackmode
- uses new GET TARGET_OS functionality
- uses new DEBUG function
- uses new MAC_HAPPY extension
2018-01-28 10:26:53 +11:00
bg-wa
920ff7fa67
New options for optical exfil payload ( #317 )
2018-01-28 10:24:58 +11:00
bg-wa
81e6d536dd
Added Optical Exfiltration Payload ( #316 )
2018-01-27 15:47:39 +11:00
KeenanV
7f902403d4
Persistent Reverse Shells for MacOS and Windows 10 ( #306 )
2018-01-22 10:39:14 +11:00
c64whiz
a998f5c86c
Add random interval to InfiniteControl payload ( #310 )
2018-01-22 10:38:38 +11:00
Jonathan Debétaz
940dc09043
Payload updates ( #309 )
2018-01-15 15:36:49 +10:00
Thorsten Sick
f8a442e66d
Proof-of-concept added: EICAR of bash bunny HID simulation for Linux ( #298 )
2017-12-12 19:12:36 +11:00
danthegoodman1
6fa5887aae
Addition of Exfiltration payload ( #300 )
2017-12-12 19:11:25 +11:00
Thorsten Sick
fae8746466
Added "Info Grabber for Linux" payload ( #299 )
2017-12-08 07:13:14 +11:00
saintcrossbow
08c24c4389
Added SmartFileExtract payload ( #296 )
2017-11-27 12:16:17 +11:00
Trae Horton
53cf608b7f
Add BlueTeamPCAudit payload ( #261 )
2017-11-23 06:32:45 +11:00
Wesley
a48d9e2a61
Updated "Linux Reverse Shell" to v1.2 ( #262 )
2017-11-22 09:59:18 +11:00
Michael Weinstein
00cee07ec0
Added "Bushings blue turtle" payload ( #263 )
2017-11-22 09:54:02 +11:00
Prodicode
e0abae7179
Added Powershell injection script with Unicorn payload. ( #288 )
2017-11-22 09:51:59 +11:00
illwill
3a1b26e9c4
Violation of CoC ( #294 )
...
* removed due to Code Of Conduct
* removed due to violation of Code of Conduct
* Delete md.ps1
* Delete p.ps1
* violation of coc
* Delete server.py
* violation of coc
* Delete payload.txt
* Delete readme.md
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete RR.ps1
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete background.mp3
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete Sherlock.ps1
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
2017-11-20 23:23:52 -08:00
danielgohlke
dbae32c86d
Update win93 prank payload ( #291 )
...
Removed usage fixed browsers and added commands to use the default system browser
2017-11-20 14:21:15 +11:00
Mikee
69cd48ee05
Added Startup-Message payload ( #260 )
2017-11-20 14:20:16 +11:00
ReshephTheGray
d65380bd94
New payload GetServicePerm ( #290 )
2017-11-20 14:16:56 +11:00
RazerBlade
f97b75983d
Updating PasswordGrabber to make it more easily understandble ( #293 )
2017-11-20 14:15:12 +11:00
fratervi
fc0b43a403
Added Lock PC prank payload ( #282 )
2017-10-27 09:46:37 +11:00
dbuttars12
763639b305
Add win support for prank 93 ( #264 )
2017-10-26 14:34:04 +11:00
DannyK999
060d5744b0
Updated InfoGrabber payload ( #279 )
2017-10-26 11:38:08 +11:00
Andre Santos
c58e10dcab
Add RevShellBack payload ( #265 )
2017-10-26 07:06:13 +11:00
Aidan Holland
5a77792c1d
Update and fix payloads ( #277 )
...
* Updated all Payloads for Version 1.2+
Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248 )
Removed all mention of DUCKY_LANG (Issue #248 )
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273
* Fixed e.cmd
* Fix e.cmd pt2
* Fixed Issues
Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
Darren Kitchen
c0ab8d3e88
Fixed RNDIS typo in Win93 Prank ( #259 )
2017-09-28 17:38:47 +10:00
James Coates
01dd281e4f
Update PasswordGrabber payload ( #246 )
...
Fixed issue where script would not work before 10 AM, puts in a space which makes the path broken.
2017-09-12 16:22:29 +10:00