mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* Initial commit HID Powershell attack to dump WiFiCreds * Update readme.md * changed initial LED blink color to white * Changed initial LED color to white * Changed initial LED Color to white * swapped sync before LED * switched from powershell to batch * Update payload.txt * using powershell again , updated version and LEDs * using powershell, added usb eject, Win 7,8,10 * added window resizing to hide payload typing * Update payload.txt * pull request * BrowserCreds Pull * separate powershell script called from payload also added result detection * update LEDs * Update payload.txt * initial commit * Update payload.txt * initial pull * initial commit
RickRoll Prank
- Author: illwill
- Version: Version 0.1
- Target: Windows
Description
Uses a HID/Ethernet Attack to run a RickRoll powershell script from Lee Holmes
Configuration
None needed.
STATUS
| LED | Status |
|---|---|
| Blue (blinking) | Running Powershell / Waiting for WebServer |
| White (blinking) | WebServer started starting the rickroll |
| Green | RickRoll Started, Safe to pull |