aleff-github
0adde48233
README
2023-07-14 11:22:21 +02:00
Aleff
d6bae24975
Defend yourself against CVE-2023-36884 Office and Windows HTML Remote Code Execution Vulnerability
...
This script allows you to set the Register Key block rule that will allow you to defend against CVE-2023-36884.
2023-07-14 11:21:09 +02:00
afsh4ck
0e8dc65a3b
Update payload.txt
2023-06-12 12:33:02 +02:00
afsh4ck
37a4d9b42e
Update of MacPhotoExfill & Create MacDocsExfill ( #588 )
...
* Update readme.md
* Update payload.txt
* Create MacDocsExfill
* Delete MacDocsExfill
* Add files via upload
2023-06-09 20:03:32 -05:00
hak5glytch
f7d2a5879c
Revert "Add bb-logger keylogger"
2023-06-06 14:00:57 -05:00
hak5glytch
7263f81135
Merge pull request #583 from Genplat/master
...
Add bb-logger keylogger
2023-06-06 14:00:20 -05:00
hak5glytch
38e84fa604
Merge pull request #586 from afsh4ck/master
...
Exfilter all the images from the principal folders on unlocked MacOS …
2023-06-06 13:55:56 -05:00
afsh4ck
e2b0e495b3
Exfilter all the images from the principal folders on unlocked MacOS targets.
2023-06-02 12:49:10 +02:00
rf-bandit
b4ba117e41
Update payload.txt
2023-06-01 07:25:39 -06:00
rf-bandit
8ffed622f0
Update payload.txt
2023-06-01 07:19:54 -06:00
rf-bandit
3443b46fcc
Update readme.md
2023-06-01 07:19:24 -06:00
rf-bandit
ec2f60c6aa
Update payload.txt
2023-06-01 07:17:18 -06:00
rf-bandit
e140b88873
Add files via upload
2023-06-01 00:35:49 -06:00
Genplat
851364d438
Create BBLoggerDecoder
2023-05-21 18:32:03 +02:00
Genplat
a66ba8610f
Create README.md
2023-05-21 18:31:07 +02:00
Genplat
f7ba3d36d9
Create payload.txt
2023-05-21 18:30:09 +02:00
90N45
bb1f296d81
Add MacFetch ( #582 )
...
* Add MacFetch
* Fix status table
* Complete status LEDs
2023-05-12 10:07:30 -06:00
0iphor13
1c166e2343
Update README.md
2023-01-25 11:52:58 +01:00
0iphor13
ac2925419c
added picture and RevBunny.ps1
2023-01-25 11:50:47 +01:00
0iphor13
2f1545eb35
Update README.md
2023-01-25 11:49:50 +01:00
0iphor13
04b4f794b7
Update payload.txt
2023-01-25 11:44:56 +01:00
0iphor13
cad78b52f2
Update payload.txt
2023-01-25 11:44:22 +01:00
hak5glytch
1c659bd4d4
Merge pull request #573 from TW-D/master
...
"VideoLan VLC Media Player" Bind Shell
2023-01-18 13:37:03 -08:00
hak5glytch
da4753f6b1
Merge pull request #577 from KryptoKola/patch-2
...
WiFi Hash Scraper
2023-01-18 13:31:31 -08:00
KryptoKola
91da428d08
Updated Setup to include GET BB_LABEL
...
Updated Setup to include GET BB_LABEL
2023-01-02 19:20:57 -05:00
KryptoKola
0189ae0fa8
Changed "BashBunny" to "${BB_LABEL}"
2022-12-29 21:48:23 -05:00
TW-D
3d9d1f8c00
Update payload.txt
2022-12-28 06:16:55 -05:00
TW-D
7bfca60e72
Update README.md
2022-12-28 06:16:09 -05:00
KryptoKola
9eda9728d0
Get-Hashes Script
2022-12-27 02:55:30 -05:00
KryptoKola
b0ebf99aad
Create payload.txt
2022-12-27 02:50:50 -05:00
drapl0n
08ca726b1e
Update README.md
2022-12-25 23:13:55 +05:30
drapl0n
dad8de62fd
compressed files
2022-12-25 23:10:27 +05:30
drapl0n
d7044ced57
adding sites
2022-12-25 23:08:32 +05:30
drapl0n
528affae1b
uploading sites
2022-12-25 23:07:19 +05:30
drapl0n
1355217bd2
uploading sites
2022-12-25 23:04:43 +05:30
drapl0n
a25109c0e6
uploading sites
2022-12-25 23:02:06 +05:30
drapl0n
53c24e2716
uploading nginx configs
2022-12-25 22:59:42 +05:30
drapl0n
5a7da24f95
uploading installation script
2022-12-25 22:58:52 +05:30
drapl0n
f58f965204
uploading payload
2022-12-25 22:57:55 +05:30
drapl0n
f17d5da6d7
Create README.md
2022-12-25 22:57:26 +05:30
TW-D
1e9f8f9bee
"VideoLan VLC Media Player" Bind Shell
...
1) Hide "PowerShell" window.
2) Determines the path of the "VLC Media Player" executable.
3) Creates two rules on the native firewall of "Microsoft Windows" to :
- Allow the executable to open a TCP port.
- Allow all incoming connections on that TCP port.
4) Starts the "VLC Media Player" executable with the "Telnet" interface enabled.
5) Redirects the standard error output of this process and retrieves the payload for execution.
2022-12-21 15:25:32 -05:00
atomic
2266a9ddf6
New Payload - cApS-Troll ( #566 )
...
* Add files via upload
* Add files via upload
* Add files via upload
* Update payload.txt
2022-12-16 13:01:05 -06:00
KryptoKola
d237d080e6
payload.txt ( #567 )
...
What the payload does:
# 1) Disables Tamper Protection in Windows Defender.
# 2) Disables UAC / Turns UAC off
# 3) Creates Payload Directory in C:/ Drive
# 4) Disables Real-Time Protection in Windows Defender.
# 5) Adds the Payload Directory as an exclusion in Windows Defender
# 6) Downloads Payload from Specified URI (Enter in Variable Below)
# 7) Runs Payload on System
2022-12-16 12:59:18 -06:00
rsxchin
d68298eaa3
Add GET BB_LABEL function and docs ( #569 )
...
* Add GET BUNNY_LABEL to get.sh
Instead of hardcoding "BashBunny" or whatever new name the Bunny has, attackers can use a GET command.
* Add docs for GET HOST_IP & GET BB_LABEL
2022-12-16 12:58:09 -06:00
drapl0n
858bb2df2c
uploading LINUX_MOUNT extension ( #570 )
...
* uploading LINUX_MOUNT extension
* uploading LINUX_MOUNT_DEMO
* decreasing delay time
* removed delays
2022-12-16 12:52:57 -06:00
atomic
e8e2103c36
Add files via upload
2022-11-14 22:41:01 -05:00
atomic
5dba64108f
Add files via upload
2022-11-02 23:10:25 -04:00
atomic
0f3b7db81d
Add files via upload
2022-10-29 12:37:42 -04:00
hak5glytch
fa0c413458
Merge pull request #561 from cribb-it/DesktopBunny
...
New Payload - Desktop Bunny
2022-10-26 12:11:14 -07:00
cribb-it
c2dc211ad8
New Payload - Desktop Bunny
2022-10-26 20:06:32 +01:00