Commit Graph

520 Commits (0adde482336656cd7c904cf0e04c079803ca3442)

Author SHA1 Message Date
aleff-github 0adde48233 README 2023-07-14 11:22:21 +02:00
Aleff d6bae24975
Defend yourself against CVE-2023-36884 Office and Windows HTML Remote Code Execution Vulnerability
This script allows you to set the Register Key block rule that will allow you to defend against CVE-2023-36884.
2023-07-14 11:21:09 +02:00
afsh4ck 0e8dc65a3b
Update payload.txt 2023-06-12 12:33:02 +02:00
afsh4ck 37a4d9b42e
Update of MacPhotoExfill & Create MacDocsExfill (#588)
* Update readme.md

* Update payload.txt

* Create MacDocsExfill

* Delete MacDocsExfill

* Add files via upload
2023-06-09 20:03:32 -05:00
hak5glytch f7d2a5879c
Revert "Add bb-logger keylogger" 2023-06-06 14:00:57 -05:00
hak5glytch 7263f81135
Merge pull request #583 from Genplat/master
Add bb-logger keylogger
2023-06-06 14:00:20 -05:00
hak5glytch 38e84fa604
Merge pull request #586 from afsh4ck/master
Exfilter all the images from the principal folders on unlocked MacOS …
2023-06-06 13:55:56 -05:00
afsh4ck e2b0e495b3
Exfilter all the images from the principal folders on unlocked MacOS targets. 2023-06-02 12:49:10 +02:00
rf-bandit b4ba117e41
Update payload.txt 2023-06-01 07:25:39 -06:00
rf-bandit 8ffed622f0
Update payload.txt 2023-06-01 07:19:54 -06:00
rf-bandit 3443b46fcc
Update readme.md 2023-06-01 07:19:24 -06:00
rf-bandit ec2f60c6aa
Update payload.txt 2023-06-01 07:17:18 -06:00
rf-bandit e140b88873
Add files via upload 2023-06-01 00:35:49 -06:00
Genplat 851364d438
Create BBLoggerDecoder 2023-05-21 18:32:03 +02:00
Genplat a66ba8610f
Create README.md 2023-05-21 18:31:07 +02:00
Genplat f7ba3d36d9
Create payload.txt 2023-05-21 18:30:09 +02:00
90N45 bb1f296d81
Add MacFetch (#582)
* Add MacFetch

* Fix status table

* Complete status LEDs
2023-05-12 10:07:30 -06:00
0iphor13 1c166e2343
Update README.md 2023-01-25 11:52:58 +01:00
0iphor13 ac2925419c
added picture and RevBunny.ps1 2023-01-25 11:50:47 +01:00
0iphor13 2f1545eb35
Update README.md 2023-01-25 11:49:50 +01:00
0iphor13 04b4f794b7
Update payload.txt 2023-01-25 11:44:56 +01:00
0iphor13 cad78b52f2
Update payload.txt 2023-01-25 11:44:22 +01:00
hak5glytch 1c659bd4d4
Merge pull request #573 from TW-D/master
"VideoLan VLC Media Player" Bind Shell
2023-01-18 13:37:03 -08:00
hak5glytch da4753f6b1
Merge pull request #577 from KryptoKola/patch-2
WiFi Hash Scraper
2023-01-18 13:31:31 -08:00
KryptoKola 91da428d08
Updated Setup to include GET BB_LABEL
Updated Setup to include GET BB_LABEL
2023-01-02 19:20:57 -05:00
KryptoKola 0189ae0fa8
Changed "BashBunny" to "${BB_LABEL}" 2022-12-29 21:48:23 -05:00
TW-D 3d9d1f8c00
Update payload.txt 2022-12-28 06:16:55 -05:00
TW-D 7bfca60e72
Update README.md 2022-12-28 06:16:09 -05:00
KryptoKola 9eda9728d0
Get-Hashes Script 2022-12-27 02:55:30 -05:00
KryptoKola b0ebf99aad
Create payload.txt 2022-12-27 02:50:50 -05:00
drapl0n 08ca726b1e
Update README.md 2022-12-25 23:13:55 +05:30
drapl0n dad8de62fd
compressed files 2022-12-25 23:10:27 +05:30
drapl0n d7044ced57
adding sites 2022-12-25 23:08:32 +05:30
drapl0n 528affae1b
uploading sites 2022-12-25 23:07:19 +05:30
drapl0n 1355217bd2
uploading sites 2022-12-25 23:04:43 +05:30
drapl0n a25109c0e6
uploading sites 2022-12-25 23:02:06 +05:30
drapl0n 53c24e2716
uploading nginx configs 2022-12-25 22:59:42 +05:30
drapl0n 5a7da24f95
uploading installation script 2022-12-25 22:58:52 +05:30
drapl0n f58f965204
uploading payload 2022-12-25 22:57:55 +05:30
drapl0n f17d5da6d7
Create README.md 2022-12-25 22:57:26 +05:30
TW-D 1e9f8f9bee
"VideoLan VLC Media Player" Bind Shell
1) Hide "PowerShell" window.
2) Determines the path of the "VLC Media Player" executable.
3) Creates two rules on the native firewall of "Microsoft Windows" to :
- Allow the executable to open a TCP port.
- Allow all incoming connections on that TCP port.
4) Starts the "VLC Media Player" executable with the "Telnet" interface enabled.
5) Redirects the standard error output of this process and retrieves the payload for execution.
2022-12-21 15:25:32 -05:00
atomic 2266a9ddf6
New Payload - cApS-Troll (#566)
* Add files via upload

* Add files via upload

* Add files via upload

* Update payload.txt
2022-12-16 13:01:05 -06:00
KryptoKola d237d080e6
payload.txt (#567)
What the payload does:
#                   1) Disables Tamper Protection in Windows Defender.
#                   2) Disables UAC / Turns UAC off
#                   3) Creates Payload Directory in C:/ Drive
#                   4) Disables Real-Time Protection in Windows Defender.
#                   5) Adds the Payload Directory as an exclusion in Windows Defender
#                   6) Downloads Payload from Specified URI (Enter in Variable Below)
#                   7) Runs Payload on System
2022-12-16 12:59:18 -06:00
rsxchin d68298eaa3
Add GET BB_LABEL function and docs (#569)
* Add GET BUNNY_LABEL to get.sh

Instead of hardcoding "BashBunny" or whatever new name the Bunny has, attackers can use a GET command.

* Add docs for GET HOST_IP & GET BB_LABEL
2022-12-16 12:58:09 -06:00
drapl0n 858bb2df2c
uploading LINUX_MOUNT extension (#570)
* uploading LINUX_MOUNT extension

* uploading LINUX_MOUNT_DEMO

* decreasing delay time

* removed delays
2022-12-16 12:52:57 -06:00
atomic e8e2103c36
Add files via upload 2022-11-14 22:41:01 -05:00
atomic 5dba64108f
Add files via upload 2022-11-02 23:10:25 -04:00
atomic 0f3b7db81d
Add files via upload 2022-10-29 12:37:42 -04:00
hak5glytch fa0c413458
Merge pull request #561 from cribb-it/DesktopBunny
New Payload - Desktop Bunny
2022-10-26 12:11:14 -07:00
cribb-it c2dc211ad8 New Payload - Desktop Bunny 2022-10-26 20:06:32 +01:00