illwill 147a71fe4f Added browsercreds, wificreds, and mrrobot payloads (#114)
* Initial commit

HID Powershell attack to dump WiFiCreds

* Update readme.md

* changed initial LED blink color to white

* Changed initial LED color to white

* Changed initial LED Color to white

* swapped sync before LED

* switched from powershell to batch

* Update payload.txt

* using powershell again , updated version and LEDs

* using powershell, added usb eject,  Win 7,8,10

* added window resizing to hide payload typing

* Update payload.txt

* pull request

* BrowserCreds Pull

* separate powershell script called from payload

also added result detection

* update LEDs

* Update payload.txt

* initial commit

* Update payload.txt

* initial pull

* initial commit
2017-04-07 15:48:20 +10:00
..

RickRoll Prank

  • Author: illwill
  • Version: Version 0.1
  • Target: Windows

Description

Uses a HID/Ethernet Attack to run a RickRoll powershell script from Lee Holmes

Configuration

None needed.

STATUS

LED Status
Blue (blinking) Running Powershell / Waiting for WebServer
White (blinking) WebServer started starting the rickroll
Green RickRoll Started, Safe to pull

Discussion

Hak5 Forum Thread