mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* Updated all Payloads for Version 1.2+ Fixed Style Issues on extensions and payloads. Added GET TARGET_OS to get.sh Removed and Fixed all uses ducky_helper.sh (Issue #248) Removed all mention of DUCKY_LANG (Issue #248) Renamed Payloads with spaces in name Added an extension to keep Macs Happy Added a payload for Mac DNS poisoning Fixed Issue #271 changed wget to curl -o Implemented PR #268 Implemented PR #273 * Fixed e.cmd * Fix e.cmd pt2 * Fixed Issues Fixed issues pointed out by @sebkinne Fixed styling errors
Exfiltrate File Information
Author: @A_SarcasticGuy
Target: Windows
Version: Version 1.0
Description
Exfiltrate file information if they start with a specific passphrase, and once complete the Bunny should be ejected
NOTE: The Bunny will only be ejected when it is not in use, so if the scan is still continuing it will fail to eject
Configuration
HID STORAGE
Requirements
p.ps1 file MUST be in /payloads folder.
STATUS
| LED | Status |
|---|---|
| Purple | Script Started |
| Yellow | Ducky Script Started |
| Red | Failed to find Ducky Script |