Commit Graph

805 Commits (master)

Author SHA1 Message Date
Mohamed A. Baset b3537e7a65
Update payload.txt 2019-05-30 00:55:17 -05:00
Mohamed A. Baset d9d741e828
Update readme.md 2019-05-30 00:54:11 -05:00
Mohamed A. Baset 0973bf25ec
Create payload.txt 2019-05-30 00:50:08 -05:00
Mohamed A. Baset fcb15af701
Update readme.md 2019-05-30 00:36:31 -05:00
Mohamed A. Baset ddffe360a4
Update readme.md 2019-05-30 00:35:55 -05:00
Mohamed A. Baset bb2c9c5bfd
Create mmcbrute.py 2019-05-30 00:31:56 -05:00
Mohamed A. Baset 4778effde3
Create README.md 2019-05-30 00:31:11 -05:00
Mohamed A. Baset 0ac9056917
Create LICENSE 2019-05-30 00:30:30 -05:00
Mohamed A. Baset fcac3b6d29
Create userlist.txt 2019-05-30 00:08:51 -05:00
Mohamed A. Baset 031a47b0d2
Create passlist.txt 2019-05-30 00:07:30 -05:00
Mohamed A. Baset d11515bf59
Create readme.md 2019-05-30 00:05:43 -05:00
Darren Kitchen 36e34feac4
Update payload.txt 2019-05-28 12:42:10 -07:00
John Impallomeni dba779b304
Change link to https 2019-05-22 21:19:56 -06:00
Catatonic c282540f52 Clarying documentation based on user feedback. (#381) 2019-05-22 18:46:59 -07:00
Catatonic f171837db2 Add Jackalope (#380)
* Adding Jackalope, a Bunny+Metasploit chimera project.

* Fixing inaccurate documentation.

* Generate the password entry payload on the alternate switch.

* Additional documentation concerning alternate payload mechanism.

* Branding

* Update readme.md

* rearchitecting payload to be independent. No longer overwrites alternate payload location. Uses WAIT interface to interact with the tester to reuse a password, clear the password, and re-attack the machine.
2019-05-22 16:53:59 -07:00
TheDragonkeeper ca22f20b53
Update payload.txt 2019-04-20 04:48:38 +01:00
TheDragonkeeper d22c2481a0
Update Readme.md 2019-04-20 04:46:02 +01:00
TheDragonkeeper 63c62a4871
Update Readme.md 2019-04-20 04:34:31 +01:00
TheDragonkeeper 81b4e060c8
Update Readme.md 2019-04-20 04:33:15 +01:00
TheDragonkeeper a9b191045b added all auth options 2019-04-20 03:59:41 +01:00
TheDragonkeeper bed7de2cd4
Update payload.sh 2019-04-08 19:16:09 +01:00
TheDragonkeeper f573cb9b0b
Create payload.sh 2019-04-08 18:43:01 +01:00
TheDragonkeeper cda2430080 ChromeOS Enrolment Payload 2019-04-06 03:14:38 +01:00
TheDragonkeeper 963c000ab9 added keylogger 2019-04-06 00:50:03 +01:00
Kamots 6760498c27 Created waiteject.sh to wait on USB storage eject. (#374) 2019-03-29 15:03:54 -07:00
WWVB 16efe8b05b
Added ARP to loot 2019-03-28 10:31:55 -04:00
WWVB f9d4737fc0
Added ARP data to the loot 2019-03-28 10:30:47 -04:00
Darren Kitchen 7c8fbf0f41
Extension by Raf 2019-03-26 18:28:18 -07:00
WWVB 230a677aa3
Update readme.md 2019-03-26 09:42:49 -04:00
WWVB 40a9afa7c4
Update readme.md 2019-03-26 09:01:09 -04:00
WWVB 470fd8a0ce
Update readme.md 2019-03-26 09:00:28 -04:00
WWVB 32d7801f0e
Update readme.md 2019-03-26 08:59:09 -04:00
WWVB fa33a23a72
Update readme.md 2019-03-26 08:57:48 -04:00
WWVB d31b0174b7
Update readme.md 2019-03-26 08:56:37 -04:00
WWVB 3ee2668f7e
Update readme.md 2019-03-26 08:53:57 -04:00
WWVB c52ce015de
Update readme.md 2019-03-26 08:52:28 -04:00
WWVB 3ed306ef99
Added SSHhhhhh (Linux) to the library
Plant your RSA key into the victim's authorized_keys, schedule a reverse shell via CRON and grab the contents of the .ssh folder.
2019-03-26 08:51:04 -04:00
G4te-Keep3r 502576d7ed Made ALTCODE-TRANSCODER. (#373)
* Response to Hak5 2506

* A random 'e' ended up on line 58.

Line is blank now like it is supposed to be.

* Created readme

STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen b1309229cc
Added ALTCODE demo payload 2019-02-06 18:19:47 -08:00
Darren Kitchen d341068548
Added dropbox exfiltrator PoC payload 2019-01-30 12:17:55 -08:00
Joel Tyler 55c7d4f706 Added Discord Server. (#370) 2019-01-24 10:28:29 -08:00
Rosius Yves 0ee25f8d0d Update payload.txt (#365)
Some more shortening. Only 183 characters!

powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"

* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
 switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen 0273c87be2
Added key code spammer test payload 2019-01-22 23:22:21 -08:00
0rion fed24a87b4
Update Info.ps1
Gets COM& Serial Device PID&VID if doing a walk about and want to collect info on HID/PID&VID + MI for future use. just a thought
#Get - Com & Serial Devices
$COMDevices = Get-Wmiobject Win32_USBControllerDevice | ForEach-Object{[Wmi]($_.Dependent)} | Select-Object Name, DeviceID, Manufacturer | Sort-Object -Descending Name | Format-Table

"COM & SERIAL DEVICES"
"==================================================================" + ($COMDevices | Out-String)
""
2019-01-17 19:29:40 -07:00
0rion 9777ae0fee
Update for Info.ps1
Removes all Variables created during the session. I noticed my version of PS was storing them between simulated attacks. so removing them entirely was my resolve.

Remove-Variable -Name computerPubIP,
computerIP,IsDHCPEnabled,Network,Networks, 
computerMAC,computerSystem,computerBIOS,computerOs,
computerCpu, computerMainboard,computerRamCapacity,
computerRam,driveType,Hdds,RDP,WLANProfileNames,WLANProfileName,
Output,WLANProfileObjects,WLANProfilePassword,WLANProfileObject,luser,
process,listener,listenerItem,process,service,software,drivers,videocard,
vault -ErrorAction SilentlyContinue -Force
2019-01-17 19:21:02 -07:00
Darren Kitchen 9687a8d830
Added cross platform lockout payload 2019-01-16 17:57:32 -08:00
Darren Kitchen d386f07d8e
Added wallpaper prank payload re: Hak5 episode 2502 2019-01-09 10:58:36 -08:00
Darren Kitchen 820576a103
Updated title 2019-01-01 14:37:25 -08:00
Darren Kitchen e61d58d488
Added the cross platform continuous locker payload 2019-01-01 14:36:44 -08:00
Eric Briese e0c355da0a Changed options to be in payload.txt per best practices 2018-12-29 22:51:23 +10:00