Commit Graph

619 Commits (22943e76e69675fe3de7ececf48755766668c2ca)

Author SHA1 Message Date
90N45 2c9b668bfa
Add SleepyMacRick
Installs a script that will listen for user activity in the background. When the user starts working on his machine, a „Rick Roll“ will be triggered.
2023-09-10 13:40:44 +02:00
afsh4ck 5ec93761fd
Create MacDoor - A Python Backdoor for MacOS (#662)
* Add files via upload

* Update readme.md

* Add files via upload

* Update readme.md

* Update payload.txt
2023-08-30 15:39:59 -07:00
0iphor13 dff31d6a6a
Update readme.md 2023-08-25 13:48:33 +02:00
0iphor13 3f21e4d7fa
Created SerialNumBunny
Provide payloads in the bunny serial number and execute them via PowerShell.
2023-08-25 13:47:33 +02:00
quentinlamamy 5cfae30936 Add github information exfiltration payload 2023-08-20 12:06:24 +02:00
90N45 0750db3a35
Add pictures to README.md 2023-07-31 23:35:31 +02:00
90N45 491e467ca0
Add alert title + optional internet check 2023-07-31 23:15:28 +02:00
quentinlamamy 971a981c9f Submit Discorde exfiltration extension 2023-07-31 18:56:30 +02:00
90N45 133f6d94aa
Add MacAlertPhisher 2023-07-28 23:00:19 +02:00
afsh4ck 0e8dc65a3b
Update payload.txt 2023-06-12 12:33:02 +02:00
afsh4ck 37a4d9b42e
Update of MacPhotoExfill & Create MacDocsExfill (#588)
* Update readme.md

* Update payload.txt

* Create MacDocsExfill

* Delete MacDocsExfill

* Add files via upload
2023-06-09 20:03:32 -05:00
hak5glytch f7d2a5879c
Revert "Add bb-logger keylogger" 2023-06-06 14:00:57 -05:00
hak5glytch 7263f81135
Merge pull request #583 from Genplat/master
Add bb-logger keylogger
2023-06-06 14:00:20 -05:00
hak5glytch 38e84fa604
Merge pull request #586 from afsh4ck/master
Exfilter all the images from the principal folders on unlocked MacOS …
2023-06-06 13:55:56 -05:00
afsh4ck e2b0e495b3
Exfilter all the images from the principal folders on unlocked MacOS targets. 2023-06-02 12:49:10 +02:00
rf-bandit b4ba117e41
Update payload.txt 2023-06-01 07:25:39 -06:00
rf-bandit 8ffed622f0
Update payload.txt 2023-06-01 07:19:54 -06:00
rf-bandit 3443b46fcc
Update readme.md 2023-06-01 07:19:24 -06:00
rf-bandit ec2f60c6aa
Update payload.txt 2023-06-01 07:17:18 -06:00
rf-bandit e140b88873
Add files via upload 2023-06-01 00:35:49 -06:00
Genplat 851364d438
Create BBLoggerDecoder 2023-05-21 18:32:03 +02:00
Genplat a66ba8610f
Create README.md 2023-05-21 18:31:07 +02:00
Genplat f7ba3d36d9
Create payload.txt 2023-05-21 18:30:09 +02:00
90N45 bb1f296d81
Add MacFetch (#582)
* Add MacFetch

* Fix status table

* Complete status LEDs
2023-05-12 10:07:30 -06:00
0iphor13 1c166e2343
Update README.md 2023-01-25 11:52:58 +01:00
0iphor13 ac2925419c
added picture and RevBunny.ps1 2023-01-25 11:50:47 +01:00
0iphor13 2f1545eb35
Update README.md 2023-01-25 11:49:50 +01:00
0iphor13 04b4f794b7
Update payload.txt 2023-01-25 11:44:56 +01:00
0iphor13 cad78b52f2
Update payload.txt 2023-01-25 11:44:22 +01:00
hak5glytch 1c659bd4d4
Merge pull request #573 from TW-D/master
"VideoLan VLC Media Player" Bind Shell
2023-01-18 13:37:03 -08:00
hak5glytch da4753f6b1
Merge pull request #577 from KryptoKola/patch-2
WiFi Hash Scraper
2023-01-18 13:31:31 -08:00
KryptoKola 91da428d08
Updated Setup to include GET BB_LABEL
Updated Setup to include GET BB_LABEL
2023-01-02 19:20:57 -05:00
KryptoKola 0189ae0fa8
Changed "BashBunny" to "${BB_LABEL}" 2022-12-29 21:48:23 -05:00
TW-D 3d9d1f8c00
Update payload.txt 2022-12-28 06:16:55 -05:00
TW-D 7bfca60e72
Update README.md 2022-12-28 06:16:09 -05:00
KryptoKola 9eda9728d0
Get-Hashes Script 2022-12-27 02:55:30 -05:00
KryptoKola b0ebf99aad
Create payload.txt 2022-12-27 02:50:50 -05:00
drapl0n 08ca726b1e
Update README.md 2022-12-25 23:13:55 +05:30
drapl0n dad8de62fd
compressed files 2022-12-25 23:10:27 +05:30
drapl0n d7044ced57
adding sites 2022-12-25 23:08:32 +05:30
drapl0n 528affae1b
uploading sites 2022-12-25 23:07:19 +05:30
drapl0n 1355217bd2
uploading sites 2022-12-25 23:04:43 +05:30
drapl0n a25109c0e6
uploading sites 2022-12-25 23:02:06 +05:30
drapl0n 53c24e2716
uploading nginx configs 2022-12-25 22:59:42 +05:30
drapl0n 5a7da24f95
uploading installation script 2022-12-25 22:58:52 +05:30
drapl0n f58f965204
uploading payload 2022-12-25 22:57:55 +05:30
drapl0n f17d5da6d7
Create README.md 2022-12-25 22:57:26 +05:30
TW-D 1e9f8f9bee
"VideoLan VLC Media Player" Bind Shell
1) Hide "PowerShell" window.
2) Determines the path of the "VLC Media Player" executable.
3) Creates two rules on the native firewall of "Microsoft Windows" to :
- Allow the executable to open a TCP port.
- Allow all incoming connections on that TCP port.
4) Starts the "VLC Media Player" executable with the "Telnet" interface enabled.
5) Redirects the standard error output of this process and retrieves the payload for execution.
2022-12-21 15:25:32 -05:00
atomic 2266a9ddf6
New Payload - cApS-Troll (#566)
* Add files via upload

* Add files via upload

* Add files via upload

* Update payload.txt
2022-12-16 13:01:05 -06:00
KryptoKola d237d080e6
payload.txt (#567)
What the payload does:
#                   1) Disables Tamper Protection in Windows Defender.
#                   2) Disables UAC / Turns UAC off
#                   3) Creates Payload Directory in C:/ Drive
#                   4) Disables Real-Time Protection in Windows Defender.
#                   5) Adds the Payload Directory as an exclusion in Windows Defender
#                   6) Downloads Payload from Specified URI (Enter in Variable Below)
#                   7) Runs Payload on System
2022-12-16 12:59:18 -06:00
rsxchin d68298eaa3
Add GET BB_LABEL function and docs (#569)
* Add GET BUNNY_LABEL to get.sh

Instead of hardcoding "BashBunny" or whatever new name the Bunny has, attackers can use a GET command.

* Add docs for GET HOST_IP & GET BB_LABEL
2022-12-16 12:58:09 -06:00
drapl0n 858bb2df2c
uploading LINUX_MOUNT extension (#570)
* uploading LINUX_MOUNT extension

* uploading LINUX_MOUNT_DEMO

* decreasing delay time

* removed delays
2022-12-16 12:52:57 -06:00
atomic e8e2103c36
Add files via upload 2022-11-14 22:41:01 -05:00
atomic 5dba64108f
Add files via upload 2022-11-02 23:10:25 -04:00
atomic 0f3b7db81d
Add files via upload 2022-10-29 12:37:42 -04:00
hak5glytch fa0c413458
Merge pull request #561 from cribb-it/DesktopBunny
New Payload - Desktop Bunny
2022-10-26 12:11:14 -07:00
cribb-it c2dc211ad8 New Payload - Desktop Bunny 2022-10-26 20:06:32 +01:00
hak5glytch afc3ac3478
Merge pull request #560 from 0iphor13/master
Updated PingZhellBunny
2022-10-20 10:36:29 -07:00
hak5glytch eab131c783
Merge pull request #559 from I-Am-Jakoby/master
New Payload - JumpScare-2.0
2022-10-20 10:28:24 -07:00
0iphor13 a035d268c4
Update README.md 2022-10-19 18:36:48 +02:00
0iphor13 a67650031f
Merge branch 'hak5:master' into master 2022-10-19 18:32:42 +02:00
0iphor13 427150a0dc
Update Bunny.pl 2022-10-19 18:32:24 +02:00
0iphor13 0c39fffbf2
Update payload.txt 2022-10-19 18:30:42 +02:00
0iphor13 9494ab8d2e
Update README.md 2022-10-19 18:29:26 +02:00
0iphor13 a991cd7af4
Update payload.txt 2022-10-19 18:26:40 +02:00
0iphor13 cad1abe00b
Update and rename PingZhell.ps1 to PingZhellBunny.ps1 2022-10-19 18:25:53 +02:00
0iphor13 caafcfb103
Update Bunny.pl 2022-10-19 18:24:26 +02:00
I-Am-Jakoby e74796ae1e
New Payload - JumpScare-2.0 2022-10-17 18:05:41 -05:00
hak5glytch 962477433c
Merge pull request #558 from I-Am-Jakoby/master
New Payload - ADV Rick Roll
2022-10-14 13:06:33 -06:00
I-Am-Jakoby b110693304
New Payload - YouTube Tripwire 2022-10-13 22:15:32 -05:00
I-Am-Jakoby 3ee453979d
Add files via upload 2022-10-13 01:20:15 -05:00
hak5glytch ab146c05d2
Merge pull request #557 from I-Am-Jakoby/master
New Payload - Shortcut Jacker
2022-10-11 17:03:52 -06:00
I-Am-Jakoby 92e76d35fc
Add files via upload 2022-10-10 23:37:26 -05:00
atomic 85ecdd5889
Add files via upload 2022-10-10 23:10:33 -04:00
atomic 1977d49f8e
Add files via upload 2022-10-10 23:05:56 -04:00
hak5glytch 8f19915a5f
Merge pull request #546 from atomiczsec/master
New Payload - Copy-And-Waste
2022-10-09 11:57:16 -06:00
hak5glytch 322cf4f7c1
Merge pull request #548 from atomiczsec/master
New Payload - Water-UnMark
2022-10-09 11:05:57 -06:00
hak5glytch 5a67438f87
Merge pull request #549 from drapl0n/master
BunnyLogger2.0: Tweaks and Updates
2022-10-08 18:40:32 -06:00
hak5glytch 7892015c02
Merge pull request #550 from Jeklah/patch-1
Update BBB.ps1
2022-10-08 18:39:25 -06:00
hak5glytch 1b76be74ee
Merge pull request #551 from Jeklah/patch-2
Update payload.txt
2022-10-08 18:39:01 -06:00
atomic a08e9b382d
New Payload - Screen-Shock (#552)
* Add files via upload

* Update c.ps1

* Add files via upload
2022-10-08 18:32:28 -06:00
TW-D fa5dae9b11
Linux Random Reverse Shell (#553)
1) Checks the availability of binaries on the system.
2) Builds a list of possible payloads.
3) Performs one at random.
2022-10-08 18:25:34 -06:00
Jeklah 5a15fac2f0
Update payload.txt
Minor typo in comments.
2022-09-07 00:14:14 +01:00
Jeklah 3e608cdd3d
Update BBB.ps1
Typo in comments, Chrome should be Edge.
2022-09-06 23:32:19 +01:00
drapl0n 6d4455d239
Update payload.txt 2022-09-05 21:44:49 +05:30
drapl0n c9dafb479f
moving payload.sh 2022-09-05 21:43:42 +05:30
drapl0n b813f1b196
moving bunnyLoggerMgr 2022-09-05 21:43:01 +05:30
drapl0n b5bd4487b1
Update uninstall.sh 2022-09-05 21:41:46 +05:30
drapl0n d328ab9db3
Update install.sh 2022-09-05 21:41:13 +05:30
drapl0n 5738de5e9e
uploading BunnyLogger 2.0 (#545)
* Uploaded BunnyLogger

* uploading payload intel

* Create README.md

* Update README.md

* uploaded LinuxPreter

* uploaded FileRipper

Faster executing version

* Update README.md

* fixing typo

* uploaded sudoSnatch

* Update README.md

* deleting sudoSnatch

* uploading payload

* Delete payload.sh

* Delete shell

* Delete systemBus

* Delete camPeek directory

* Update payload.sh

* Update payload.sh

* Delete payloads/library/execution/FileRipper directory

* Update payload.sh

* Update payload.sh

* Update payload.sh

* Update payload.sh

* uploading BLE_EXFIL extension

BLE_EXFIL extension, exfiltrates data via BLE

* BLE_EXFIL demo

* uploading mine4me

mine4me payload makes your target system mine Monero for you. Spread payload in multiple systems to acquire more Monero.

* category update

* Uploading BunnyLogger 2.0
2022-09-01 14:19:05 -05:00
atomic 7169158bb8
Add files via upload 2022-08-30 18:50:10 -04:00
atomic f864ad8323
Merge branch 'hak5:master' into master 2022-08-30 18:39:55 -04:00
atomic 8e322706bc
New payload - Bookmark-Hog (#543) 2022-08-30 09:56:42 -05:00
TW-D b10a644277
Add Fake SSH (#544)
1) Copies the "ssh" command spoofing program to the user's home directory.
2) Defines a new persistent "ssh" alias with the file "~/.bash_aliases".
3) When the user executes the command "ssh" in a terminal, the spoofing program :
- __By default__ retrieves the username@address and password and writes them to "/tmp/.ssh_password".
- __But__ this behavior can be changed in line 20 of the "ssh-phishing.sh" file.
2022-08-30 09:37:50 -05:00
Carey Balboa 2aa4910d0c
add my own exfil payload (#540)
* add my own exfil payload

Exfiltrates files from logged in users Documents and Desktop folders

* updated

* Update readme.md
2022-08-30 09:28:28 -05:00
atomic a59fbe93c7
Add files via upload 2022-08-23 21:44:25 -04:00
0iphor13 0bc2dad2f6
added Disclaimer (#539)
* Uploaded ReverseBunny

Obfuscated reverse shell via powershell

* Uploaded WifiSnatch

Get your targets stored wifi information and credentials, store them on your Bashbunny and hop away 🐇

* Update ReverseBunny.txt

Changed payload to evade Windows Defender

* Update payload.txt

Added new "Eject Method" - props to Night(9o3)

* Update README.md

* Deleted ReverseBunny.txt

Deleted because of higher risk to get caught by AV

* Updated ReverseBunny to version 1.2

Updated ReverseBunny to version 1.2.
- Deleted payload on disk because of AV
- Added custom shell design

* Updated ReverseBunny to version 1.2

Updated README for ReverseBunny update

* Updated payload

fixed some stupid left overs <3

* Uploaded pingUinBunny

a reverse shell using icmp

* Delete payloads/library/remote_access/switch1 directory

* Uploaded pingUinBunny

A reverse shell using icmp

* Update README.md

* Update README.md

* Updated to PingZhell

* Update Bunny.pl

* Update README.md

* Update README.md

* Update payload.txt

* Rename payloads/library/remote_access/pingUinBunny/Bunny.pl to payloads/library/remote_access/PingZhellBunny/Bunny.pl

* Rename payloads/library/remote_access/pingUinBunny/PingZhell.ps1 to payloads/library/remote_access/PingZhellBunny/PingZhell.ps1

* Rename payloads/library/remote_access/pingUinBunny/README.md to payloads/library/remote_access/PingZhellBunny/README.md

* Rename payloads/library/remote_access/pingUinBunny/payload.txt to payloads/library/remote_access/PingZhellBunny/payload.txt

* Update payload.txt

* Update README.md

* Update README.md

* Update Bunny.pl

* Created ProcDumpBunny

Dump lsass.exe with a renamed version of procdump and get the users hashes with Mimikatz

* Update README.md

* Update payload.txt

* Updated ReverseBunny

Fixed wrong DELAY commands

* Updated PingZhellBunny

Fixed wrong DELAY commands

* Updated WifiSnatch

Fixed multiple mistakes

* Uploaded HashDumpBunny

Use your BashBunny to dump the user hashes of your target - similar to the msf post-module.
The script was obfuscated with multiple layers, so don't be confused.
If you don't trust this script, run it within a save testing space - which should be best practice anyways ;)

* added example picture

* Update README.md

* Uploaded SessionBunny

Utilize SessionGopher (Slightly modified) to find PuTTY, WinSCP, and Remote Desktop saved sessions. It decrypts saved passwords for WinSCP.
Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords.

Afterwards decide which is important and what you want to save onto your BashBunny.

* Uploaded SessionBunny

Utilize the famous, here slightly modified SessionGopher script, to find PuTTY, WinSCP, and Remote Desktop saved sessions. It decrypts saved passwords for WinSCP.
Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords.

Decide which inforamtion you wanna take with you - save it onto your BashBunny!

* Update README.md

* Delete SessionBunny directory

* Uploaded MiniDumpBunny

Dump lsass with this rewritten and for BashBunny adapted version of Powersploits Out-MiniDump.

* Update README.md

added disclaimer

* Update README.md

* Update README.md

* Update README.md

* Uploaded ReverseBunnySSL

* Update README.md

* Update README.md

* Update payload.txt

* Update README.md

* Uploaded SamDumpBunny

Dumps users sam & system hive, which can be used later to extract the users hashes

* added Disclaimer

Added disclaimer about samdump2
2022-07-14 14:28:08 -05:00
PeteDavis91 ca22cb3c37
OooohThatsHandy - Juicy Data Grabber (#538)
* Add files via upload

* Rename Read-Me.txt to Read-Me

* Rename payload.txt.txt to payload

* Add files via upload

Added some features and fixed a few bugs I found

* Delete payload

* Rename payload.txt.txt to payload
2022-07-14 14:25:28 -05:00
Ferrari cae94215c7
Update x.cmd (#536)
If google chrome is installed, download the history.
2022-07-14 14:22:18 -05:00
cribb-it 8185b97046
New Payload - Be a pest (#535)
* New Payload - Be a pest

* Update - Spelling
2022-06-22 14:34:14 -05:00