Aidan Holland 5a77792c1d Update and fix payloads (#277)
* Updated all Payloads for Version 1.2+

Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248)
Removed all mention of DUCKY_LANG (Issue #248)
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273

* Fixed e.cmd

* Fix e.cmd pt2

* Fixed Issues

Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
..
2017-04-10 13:29:17 +10:00
2017-10-25 11:10:17 +11:00
2017-04-10 13:29:17 +10:00

Exfiltrate File Information

Author: @A_SarcasticGuy
Target: Windows
Version: Version 1.0

Description

Exfiltrate file information if they start with a specific passphrase, and once complete the Bunny should be ejected

NOTE: The Bunny will only be ejected when it is not in use, so if the scan is still continuing it will fail to eject

Configuration

HID STORAGE

Requirements

p.ps1 file MUST be in /payloads folder.

STATUS

LED Status
Purple Script Started
Yellow Ducky Script Started
Red Failed to find Ducky Script