295 Commits

Author SHA1 Message Date
Marc
f9aadb0a4d
Merge pull request #339 from JamesCullum/master
Updated RaZ_ReverseShell
2019-06-28 00:25:07 +00:00
Marc
00b2ea8aa9
Merge pull request #340 from hink/master
[PAYLOAD UPDATE] psh_DownloadExec Update
2019-06-28 00:23:05 +00:00
Marc
0b9f7c0b47
Merge pull request #349 from TheG3ntl3man/patch-1
Adding Delay to Prank/Startup-Message
2019-06-28 00:15:21 +00:00
Marc
b6af89dbdc
Merge pull request #360 from Atrolantra/master
Moved screen height and width to configurable options
2019-06-28 00:07:40 +00:00
Marc
2f23f34e6a
Merge pull request #367 from 0rion5/patch-4
Update for Info.ps1
2019-06-28 00:04:13 +00:00
Marc
d3727bd899
Merge pull request #368 from 0rion5/patch-5
Update Info.ps1
2019-06-28 00:03:29 +00:00
Marc
dabde35526
Merge pull request #382 from jimpallomeni/patch-1
Change link to https
2019-06-27 23:57:24 +00:00
Marc
516df5d36c
Merge pull request #388 from Jesper-Andersen/patch-1
Update dk.json
2019-06-27 23:53:52 +00:00
Jesper Andersen
8a9437ae6e
Update dk.json
Add character "^"
2019-06-27 15:17:53 +02:00
Darren Kitchen
aec718806e
Update payload.txt 2019-06-06 12:45:35 -07:00
Darren Kitchen
8dd4797e5d
Update payload.txt 2019-06-06 12:45:12 -07:00
Darren Kitchen
36e34feac4
Update payload.txt 2019-05-28 12:42:10 -07:00
John Impallomeni
dba779b304
Change link to https 2019-05-22 21:19:56 -06:00
Catatonic
c282540f52 Clarying documentation based on user feedback. (#381) 2019-05-22 18:46:59 -07:00
Catatonic
f171837db2 Add Jackalope (#380)
* Adding Jackalope, a Bunny+Metasploit chimera project.

* Fixing inaccurate documentation.

* Generate the password entry payload on the alternate switch.

* Additional documentation concerning alternate payload mechanism.

* Branding

* Update readme.md

* rearchitecting payload to be independent. No longer overwrites alternate payload location. Uses WAIT interface to interact with the tester to reuse a password, clear the password, and re-attack the machine.
2019-05-22 16:53:59 -07:00
Kamots
6760498c27 Created waiteject.sh to wait on USB storage eject. (#374) 2019-03-29 15:03:54 -07:00
Darren Kitchen
7c8fbf0f41
Extension by Raf 2019-03-26 18:28:18 -07:00
G4te-Keep3r
502576d7ed Made ALTCODE-TRANSCODER. (#373)
* Response to Hak5 2506

* A random 'e' ended up on line 58.

Line is blank now like it is supposed to be.

* Created readme

STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen
b1309229cc
Added ALTCODE demo payload 2019-02-06 18:19:47 -08:00
Darren Kitchen
d341068548
Added dropbox exfiltrator PoC payload 2019-01-30 12:17:55 -08:00
Joel Tyler
55c7d4f706 Added Discord Server. (#370) 2019-01-24 10:28:29 -08:00
Rosius Yves
0ee25f8d0d Update payload.txt (#365)
Some more shortening. Only 183 characters!

powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"

* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
 switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen
0273c87be2
Added key code spammer test payload 2019-01-22 23:22:21 -08:00
0rion
fed24a87b4
Update Info.ps1
Gets COM& Serial Device PID&VID if doing a walk about and want to collect info on HID/PID&VID + MI for future use. just a thought
#Get - Com & Serial Devices
$COMDevices = Get-Wmiobject Win32_USBControllerDevice | ForEach-Object{[Wmi]($_.Dependent)} | Select-Object Name, DeviceID, Manufacturer | Sort-Object -Descending Name | Format-Table

"COM & SERIAL DEVICES"
"==================================================================" + ($COMDevices | Out-String)
""
2019-01-17 19:29:40 -07:00
0rion
9777ae0fee
Update for Info.ps1
Removes all Variables created during the session. I noticed my version of PS was storing them between simulated attacks. so removing them entirely was my resolve.

Remove-Variable -Name computerPubIP,
computerIP,IsDHCPEnabled,Network,Networks, 
computerMAC,computerSystem,computerBIOS,computerOs,
computerCpu, computerMainboard,computerRamCapacity,
computerRam,driveType,Hdds,RDP,WLANProfileNames,WLANProfileName,
Output,WLANProfileObjects,WLANProfilePassword,WLANProfileObject,luser,
process,listener,listenerItem,process,service,software,drivers,videocard,
vault -ErrorAction SilentlyContinue -Force
2019-01-17 19:21:02 -07:00
Darren Kitchen
9687a8d830
Added cross platform lockout payload 2019-01-16 17:57:32 -08:00
Darren Kitchen
d386f07d8e
Added wallpaper prank payload re: Hak5 episode 2502 2019-01-09 10:58:36 -08:00
Darren Kitchen
820576a103
Updated title 2019-01-01 14:37:25 -08:00
Darren Kitchen
e61d58d488
Added the cross platform continuous locker payload 2019-01-01 14:36:44 -08:00
Eric Briese
e0c355da0a Changed options to be in payload.txt per best practices 2018-12-29 22:51:23 +10:00
Eric
e527ab16a5
Moved screen height and width to config file. 2018-12-29 22:27:19 +10:00
TheG3ntl3man
aac697e89a
Adding Delay
You must add a delay after RUN WIN cmd or it won't always write on the cmd
2018-08-05 10:33:50 -04:00
metalkey
ee48a74dc6 Added readme (#337)
Updated author details
2018-06-04 13:31:43 +10:00
golem445
9fab25740d Bunnyhound and Quickdraw added (#343)
* Add files via upload

Initial payload

* Add files via upload

Initial payload
2018-05-20 14:23:53 -07:00
golem445
be78dafbfc Add files via upload (#342) 2018-05-20 11:29:10 -07:00
root
989be5976a update powershell run line and fix complete check 2018-05-10 13:07:22 -05:00
root
e984278d66 Merge remote-tracking branch 'upstream/master' 2018-05-07 09:35:47 -05:00
James Cullum (Pseudonym)
33ba79d692 Updated RaZ_ReverseShell
- Clean up traces
- Bugfixes on newer firmware
- Improved documentation
- Fake hardware identifier
- Added persistence via autostart
- Disconnect on end
2018-04-16 22:57:50 +02:00
metalkey
65d652a15c Add Hershell Encrypted Reverse shell payload (#335) 2018-04-11 21:21:40 +10:00
Darren Kitchen
032061688d
WAIT extension pauses until switch position changes 2018-01-30 22:10:24 -08:00
Aidan Holland
4df763c4a4 Update mac_happy extension (#319) 2018-01-31 09:17:56 +11:00
Aidan Holland
38a7460fe6 Update GET TARGET_OS so it works with AUTO_ETHERNET (#320) 2018-01-31 09:17:09 +11:00
Aidan Holland
5f31a0be02 Fix README.md (#321) 2018-01-31 09:16:23 +11:00
Tudor Gheorghiu
9011db7fae Update unicorn readme.md (#302) 2018-01-28 10:27:46 +11:00
Alex Flores
6345354375 Added chrome extension installer payload (#315)
- uses new AUTOETHERNET attackmode
 - uses new GET TARGET_OS functionality
 - uses new DEBUG function
 - uses new MAC_HAPPY extension
2018-01-28 10:26:53 +11:00
Alex Flores
65ad5f6e89 fixes mac_happy extension (#313)
- fixes state leakage of `command` variable by removing it
 - remove unecessary use of forked processes/sub-commands
 - combine input validation conditionals
 - match the standard of existing extensions of exporting function
   names as all caps
 - bump version number
2018-01-28 10:25:55 +11:00
bg-wa
920ff7fa67 New options for optical exfil payload (#317) 2018-01-28 10:24:58 +11:00
bg-wa
81e6d536dd Added Optical Exfiltration Payload (#316) 2018-01-27 15:47:39 +11:00
Alex Flores
b37aed0edc fixes debug extention (#312)
- resolve sytax errors with variable declarations
 - resolve misuse of command substition / variabl dereferencing
 - internal functions were being called before being declared
 - remove superfluous file existence checks
2018-01-24 06:12:30 +11:00
KeenanV
7f902403d4 Persistent Reverse Shells for MacOS and Windows 10 (#306) 2018-01-22 10:39:14 +11:00