mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* USB Exfiltration Payload with Win10 Fake Update This Payload exfiltrates defined files to the Bunny. While copying is in progress, it shows a Fake Win10 Update Screen and removes traces. When it's ready, the target machine is forced to reboot. * Correction for the Key injection F11 * Create test * Delete payloads/library/USB_Exfil_with_Fake_Update _and_force-reboot directory * Create tst * Add files via upload * Delete tst * Delete payloads/library/exfiltration/USB Exfil with Fake Update and force reboot directory