Aidan Holland 5a77792c1d Update and fix payloads (#277)
* Updated all Payloads for Version 1.2+

Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248)
Removed all mention of DUCKY_LANG (Issue #248)
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273

* Fixed e.cmd

* Fix e.cmd pt2

* Fixed Issues

Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
..
2017-04-20 10:55:56 +10:00
2017-10-25 11:10:17 +11:00
2017-04-20 10:55:56 +10:00

UACBypass / UACExploit - Download and executes any binary executable with administrator privileges WITHOUT UAC prompting for access

Author: @SkiddieTech Version: Version 1.1 Target: Windows 7 - Windows 10 (V1607)

Description

Download and executes any binary executable with administrator privileges WITHOUT prompting the user for administrator rights (aka UAC bypass/exploit) Please define URL and SAVEFILENAME in the a.vbs script Target does need internet connection Works on Windows 7 - Windows 10 The UAC bypass was patched in Win10 V.1607, the file will still execute but with normal user privliges However from what i am aware version 7,8 and 8.1 are still effected Currently fastest download and execute for HID attacks to date. (with UAC bypass)

Configuration

HID or HID STORAGE

Requirements

Target must be an Windows box with an working internet connection,powershell and vb script enabled (enabled by default) Please edit the a.vbs script with your binary payload URL and savename

STATUS

LED Status
Red Script is starting
Green Finished