Commit Graph

169 Commits (2903a16d890d27001c1b6bfb7c09f56d21412530)

Author SHA1 Message Date
RazerBlade 2903a16d89 Added Password Grabber payload (#169)
* Add files via upload

* Update readme.md

* Update e.cmd

* Update payload.txt

Added 1.1 Firmware support

* Update e.cmd

Added Date and time functions and added some comments

* Delete laZagne.exe

* Update readme.md

Added support to Hak5 new guidelines

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md
2017-04-16 19:03:03 +10:00
TheRealNoob 1d95d9bfb8 Updated SMB_Exfiltrator payload to wait for port 445 (SMB) rather than ICMP Ping response (#173) 2017-04-16 18:57:02 +10:00
0xCoto 7c1a4a30f2 Updated SingleSecondShell for Bash Bunny v1.1 (#179) 2017-04-16 18:15:38 +10:00
Baur 2d651c75f0 Updated DumpCreds for bunny fw v1.1 (#168)
* DumpCreds Version 2.1
- new payload.txt special for BashBunny FW 1.1
- minor changes in main.ps1
- insert some code for debugging

* Updadet becaus new fork sync

* new payload.txt special for BashBunny FW 1.1
+ minor changes in main.ps1
+ insert some code for debugging
2017-04-16 16:03:02 +10:00
k1ul3ss 7534270a7a Added MacPDFExfil payload (#186) 2017-04-16 15:53:49 +10:00
GeneralBison 6cf19a1fdb Fixed typo in NotepadFun payload (#165)
DELY vs DELAY
(Look Mum, I'm helping!)
2017-04-10 17:42:25 +10:00
Darren Kitchen b4b23c04f1 Added file sync to smb_exfiltrator payload 2017-04-10 15:54:39 +10:00
Darren Kitchen bdcbc45c94 Updated smb_exfiltrator payload for Bash Bunny v1.1 2017-04-10 15:50:27 +10:00
Wesley 7f1172849b Updated LinuxReverseShell for BashBunny Fw v1.1 (#164) 2017-04-10 15:38:02 +10:00
Sebastian Kinne 85b1bc7aca
Cleanup: Sort payloads by category 2017-04-10 13:29:17 +10:00
Didier Stevens 288d90c60e Added InfiniteControl payload (#157)
Hit the CONTROL key every 10 seconds in an infinite loop, while blinking
the red LED with every keypress.
2017-04-10 12:31:31 +10:00
The10FpsGuy 100ccb0e63 Updated Notepad_Fun payload.txt to include target (#158) 2017-04-10 12:15:24 +10:00
Ben 32468087e1 Updated WindowsCookie for firmware v1.1 and fix powershell regex for Windows 7 (#161) 2017-04-10 12:11:33 +10:00
hink ce0c7d2dbd Updated QuickCreds payload for Bash Bunny v1.1 2017-04-10 12:06:04 +10:00
Nicholas Adamou 6e7292699b Updated GitBunnyGit to work with Firmware v1.1 (#145) 2017-04-10 12:00:00 +10:00
Dan Borges ca9e466ce7 Added MacPhish payload (#70)
* Adding the MacPhish payload, uses HID and STORAGE modes on BashBunny. For OS X, uses spotlight to launch terminal, then uses osascript command to phish for the users password, then saves the phished password back to the bashbunny.

* Update readme.md
2017-04-07 17:23:48 +10:00
Mohamed A. Baset 05f34b16ee Updated SmacAndGrab payload with more loot :)
More loot from https://github.com/Seekurity/BrowserCookieGrabber/blob/master/browserCookieGrabber.sh
2017-04-07 17:22:23 +10:00
Biocow de28cc7679 Updated MacInfoGrabber payload to remove superfluous newline (#74)
There was a line break on line 30 where in reads Chrome cookies and moves to BashBunny mass storage. Removed line break.
2017-04-07 17:20:12 +10:00
RazerBlade aaa246f714 Added PasswordGrabber payload
* Add files via upload

* Update readme.md

* Update e.cmd
2017-04-07 17:19:41 +10:00
ASarcasticGuy 6542907c6e Added FileInfoExfil payload (#76)
* Scan for files that contain a specific phrase and exfil info about them

* Delete FileInfoExfil

* Create FileInfoExfil

* Delete FileInfoExfil

* Scans system for files beginning with a specific phrase and exfils data from them

* Delete ducky_script.txt

* Delete p.bat

* Delete payload.txt

* Exfil file information to the loot folder

Exfiltrates file information of files that contain a specific phrase, including if it is a directory, the file path and file size (in KB) to the loot folder of the BashBunny.

* Delete p.ps1

* Add files via upload

* Create readme.md

* Delete readme.md

* Create readme.md

* Update payload.txt

* Update readme.md
2017-04-07 17:18:48 +10:00
zachstanford 217dee5249 Added Browser Data payload
* browserData

* Fix error
2017-04-07 17:16:18 +10:00
Eric fe70f7e5b4 Added MacGetUsers payload (#78) 2017-04-07 17:14:35 +10:00
Silvian c5510c9daa Added WindowsMeterpreterStaged and WiFiGrabber payloads (#85)
* added wifi grabber and windows meterpreter staged payload

* created details and updated content of payloads - ready for publication to hak5 bash bunny scripts

* created details and updated content of payloads - ready for publication to hak5 bash bunny scripts

* Added a rename file

* added the rename file
2017-04-07 17:10:54 +10:00
Darren Kitchen 9deb63d268 Merge branch 'master' of https://github.com/hak5/bashbunny-payloads 2017-04-07 16:56:56 +10:00
NightStalker c14732e57a Added ProxyInterceptor payload (#82)
* Sets specified proxy and imports certificate for  MITM

* Update cert.pem

* Update README.md

* Update README.md

* Update README.md

* Update README.md

* Update README.md

* Update vars.ps1

* Update payload.txt

* Update README.md

* Update README.md
2017-04-07 16:56:28 +10:00
Darren Kitchen e0ed65ad9b Updated WindowsCookies payload for Bash Bunny v1.1 2017-04-07 16:56:17 +10:00
nutt318 385a54656c Added FTPExfiltration payload (#90)
* First commit of all documents

First commit

* Fixed user document folder

* Removed unneeded line

* Edited URL to forum
2017-04-07 16:51:38 +10:00
Darren Kitchen d5ccd9ae4c Merge pull request #72 from oXis/master
Facebook cookies grabber
2017-04-07 16:48:51 +10:00
RalphyZ 0ac3b7d58d Updated MacReverseShell payload (#93)
* Mac Reverse Shell

Starts a terminal window on a Mac,then creates a bash reverse shell inside a script, s.sh.  It then runs the script in the background and closes the terminal window.

* Added variables for IP and Port of the Netcat Listener

For ease of use, variables were added at the top for the IP Address and Port of the Netcat Listener.  Change those values to your listener and no other edits should be needed.

* Added persistence (and a reason to have a dropper)

This payload creates a bash reverse shell inside a script and adds persistence by adding the script to the Mac Launch Agent at a user defined interval.
2017-04-07 16:47:59 +10:00
Simen A K 243d50ab3a Updated InfoGrabber to version 2.0 (#32)
* InfoGrabber by MrSnowMonster - Version 1.0

A payload that collects information about a wndows computer and places it in a textfile.

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Version 1.1

* Update info.ps1

Added some mor informations and repaired "0123"
Testen on Win10

* Update 2

added windows passwords

* Update 1.1

Updated
2017-04-07 16:36:11 +10:00
ricky5ive bfbb8afe43 Added dryClean payload (#98)
* Create README.md

* Create payload.txt
2017-04-07 16:32:11 +10:00
Darren Kitchen 4ce2b50cb2 Updated USB Exfiltrator payload for Bash Bunny v1.1 2017-04-07 16:30:44 +10:00
Darren Kitchen d8ab0ac587 Removed tools-installer payload (deprecated in BB v1.1) 2017-04-07 16:02:48 +10:00
Darren Kitchen 4c41f449de Updated RDP Checker payload for Bash Bunny v1.1 2017-04-07 16:00:38 +10:00
Wesley b864fc30a7 Added LinuxReverseShell payload (#107) 2017-04-07 15:57:19 +10:00
hink 1760b60b4f Added psh_DownloadExec payload (#110)
* [PAYLOAD] psh_DownloadExec

* readme

* Better status check and borrowed improvments from Hak5Darren

* Updated for BashBunny v1.1_x

* markdown fix
2017-04-07 15:54:54 +10:00
Darren Kitchen 5dbb31506d Updated nmapper payload for Bash Bunny v1.1 2017-04-07 15:51:26 +10:00
Darren Kitchen 20c820eeb0 Updated nmapper for Bash Bunny v1.1 2017-04-07 15:51:25 +10:00
Darren Kitchen 4346b86ecd Removed old smb_exfiltrator payload and renamed faster_smb_exfiltrator
Old version is now deprecated. I'll eventually merge the older technique
into the existing smb_exfiltrator with execution options.
2017-04-07 15:51:23 +10:00
illwill 147a71fe4f Added browsercreds, wificreds, and mrrobot payloads (#114)
* Initial commit

HID Powershell attack to dump WiFiCreds

* Update readme.md

* changed initial LED blink color to white

* Changed initial LED color to white

* Changed initial LED Color to white

* swapped sync before LED

* switched from powershell to batch

* Update payload.txt

* using powershell again , updated version and LEDs

* using powershell, added usb eject,  Win 7,8,10

* added window resizing to hide payload typing

* Update payload.txt

* pull request

* BrowserCreds Pull

* separate powershell script called from payload

also added result detection

* update LEDs

* Update payload.txt

* initial commit

* Update payload.txt

* initial pull

* initial commit
2017-04-07 15:48:20 +10:00
0xCoto 741b4a67e5 Added SingleSecondShell payload (#115)
* Add files via upload

* Update readme.md
2017-04-07 15:45:09 +10:00
Pete Camuso 34003917ee Added NothingLess payload (#120)
Maps the file system and stores it in c:\users\tempa
Shares a drive or location to everyone and grants full security permissions to everyone
2017-04-07 15:36:11 +10:00
bg-wa 63b281646a Added AndroidOpenURL payload (#125) 2017-04-07 15:33:02 +10:00
mrbaselier 5f582ed819 Added BlackBackup Payload (#129)
* BlackBackup

BlackBackup is a Powershell (and thus Windows) backup script that is easy to configure. Make quick backups of files, the registry, passwords, WiFi Keys, SAM database etc. and save them to the BashBunny. This is a HID + STORAGE attack. Now, let's eat some carrots!

* Update credentials.ps1
2017-04-07 15:31:01 +10:00
The10FpsGuy ff05828ee8 Added Notepad_Fun Payload (#130)
* Funny Notepad Prank

* Update payload.txt

* Update payload.txt
2017-04-07 15:27:03 +10:00
DemmSec f94fcc1b66 Added a Fireytv payload (#135)
* Created payload to shell an amazon fire tv

The payload performs keyboard emulation in order to enable ADB and unknown sources on the target FireTV. Once this is completed the payload then installs a payload.apk file via ADB and then runs it.

* Created readme
2017-04-07 15:18:34 +10:00
Baur 18e71d2882 Added DumpCreds 2.0 payload (#138)
* Add files via upload

Init of DumpCreds 2.0

Dumps the usernames & plaintext passwords from 
 - Browsers (Crome, IE, FireFox)
 - Wifi 
 - SAM Hashes
 - Mimimk@tz Dump
 - Computerinformation (Hardware Info, Windows ProductKey, Hotfixes, Software, Local, AD Userlist)
 
 without 
 - Use of USB Storage (Because USB Storage ist mostly blocked by USBGuard or DriveLock)
 - Internet connection (becaus Firewall ContentFilter Blocks the download sites)

* Minor Fix

* Somf file to much

* Changes in main.ps1 - paralellize the Powershell scripts

Changes in payload.txt - Universal payload no matter if admin rights or not

Some minor changes in all PS\*.ps1 files

Signed-off-by: qdba <dieter@baur.nu>

* Forget a File

* WifiCreds changed

* Changes in README.md

* Changed Get Chrome-Cred.ps1 from https://github.com/EmpireProject/Empire/tree/master/data/module_source/collection

Changed BUILD in main.ps1
Changed Build and Credits in README.md
2017-04-07 15:13:12 +10:00
jafahulo eb68665c67 Update WiPassDump and add UnifiedRickRoll, Ascii-Prank, and Photobooth prank payload (#139)
* optimized WiPassDump payload to run in one file and a bit quicker.

* Create Prank folder and add UnifiedRickRoll payload

* Added UnifiedRickRoll support for windows

* Updated documentation on UnifiedRickRollWindows

* Causes payload to use roughly 30 times less processing power.

* Added Ascii-Prank Rick roll and Photo-Booth prank
2017-04-07 15:09:47 +10:00
DeeKoy 945b5c14d9 Added BruteBunny and ProcessInfo payloads (#140) 2017-04-07 15:01:37 +10:00
SirLurkSalot fc1d812d96 Added PowershellTCPExtractor (#144) 2017-04-07 14:49:35 +10:00