Commit Graph

269 Commits (7c8fbf0f41234fe784415521a2e8683aa1b82903)

Author SHA1 Message Date
Darren Kitchen 7c8fbf0f41
Extension by Raf 2019-03-26 18:28:18 -07:00
G4te-Keep3r 502576d7ed Made ALTCODE-TRANSCODER. (#373)
* Response to Hak5 2506

* A random 'e' ended up on line 58.

Line is blank now like it is supposed to be.

* Created readme

STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen b1309229cc
Added ALTCODE demo payload 2019-02-06 18:19:47 -08:00
Darren Kitchen d341068548
Added dropbox exfiltrator PoC payload 2019-01-30 12:17:55 -08:00
Joel Tyler 55c7d4f706 Added Discord Server. (#370) 2019-01-24 10:28:29 -08:00
Rosius Yves 0ee25f8d0d Update payload.txt (#365)
Some more shortening. Only 183 characters!

powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"

* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
 switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen 0273c87be2
Added key code spammer test payload 2019-01-22 23:22:21 -08:00
Darren Kitchen 9687a8d830
Added cross platform lockout payload 2019-01-16 17:57:32 -08:00
Darren Kitchen d386f07d8e
Added wallpaper prank payload re: Hak5 episode 2502 2019-01-09 10:58:36 -08:00
Darren Kitchen 820576a103
Updated title 2019-01-01 14:37:25 -08:00
Darren Kitchen e61d58d488
Added the cross platform continuous locker payload 2019-01-01 14:36:44 -08:00
metalkey ee48a74dc6 Added readme (#337)
Updated author details
2018-06-04 13:31:43 +10:00
golem445 9fab25740d Bunnyhound and Quickdraw added (#343)
* Add files via upload

Initial payload

* Add files via upload

Initial payload
2018-05-20 14:23:53 -07:00
golem445 be78dafbfc Add files via upload (#342) 2018-05-20 11:29:10 -07:00
metalkey 65d652a15c Add Hershell Encrypted Reverse shell payload (#335) 2018-04-11 21:21:40 +10:00
Darren Kitchen 032061688d
WAIT extension pauses until switch position changes 2018-01-30 22:10:24 -08:00
Aidan Holland 4df763c4a4 Update mac_happy extension (#319) 2018-01-31 09:17:56 +11:00
Aidan Holland 38a7460fe6 Update GET TARGET_OS so it works with AUTO_ETHERNET (#320) 2018-01-31 09:17:09 +11:00
Aidan Holland 5f31a0be02 Fix README.md (#321) 2018-01-31 09:16:23 +11:00
Tudor Gheorghiu 9011db7fae Update unicorn readme.md (#302) 2018-01-28 10:27:46 +11:00
Alex Flores 6345354375 Added chrome extension installer payload (#315)
- uses new AUTOETHERNET attackmode
 - uses new GET TARGET_OS functionality
 - uses new DEBUG function
 - uses new MAC_HAPPY extension
2018-01-28 10:26:53 +11:00
Alex Flores 65ad5f6e89 fixes mac_happy extension (#313)
- fixes state leakage of `command` variable by removing it
 - remove unecessary use of forked processes/sub-commands
 - combine input validation conditionals
 - match the standard of existing extensions of exporting function
   names as all caps
 - bump version number
2018-01-28 10:25:55 +11:00
bg-wa 920ff7fa67 New options for optical exfil payload (#317) 2018-01-28 10:24:58 +11:00
bg-wa 81e6d536dd Added Optical Exfiltration Payload (#316) 2018-01-27 15:47:39 +11:00
Alex Flores b37aed0edc fixes debug extention (#312)
- resolve sytax errors with variable declarations
 - resolve misuse of command substition / variabl dereferencing
 - internal functions were being called before being declared
 - remove superfluous file existence checks
2018-01-24 06:12:30 +11:00
KeenanV 7f902403d4 Persistent Reverse Shells for MacOS and Windows 10 (#306) 2018-01-22 10:39:14 +11:00
c64whiz a998f5c86c Add random interval to InfiniteControl payload (#310) 2018-01-22 10:38:38 +11:00
Simon Dankelmann b644446f40 Added German umlauts to de.json (#311) 2018-01-22 10:37:26 +11:00
Jonathan Debétaz 940dc09043 Payload updates (#309) 2018-01-15 15:36:49 +10:00
bg-wa 650772e9e4 Added debug extension (#155) 2018-01-10 08:22:29 +10:00
Thorsten Sick f8a442e66d Proof-of-concept added: EICAR of bash bunny HID simulation for Linux (#298) 2017-12-12 19:12:36 +11:00
danthegoodman1 6fa5887aae Addition of Exfiltration payload (#300) 2017-12-12 19:11:25 +11:00
Thorsten Sick fae8746466 Added "Info Grabber for Linux" payload (#299) 2017-12-08 07:13:14 +11:00
saintcrossbow 08c24c4389 Added SmartFileExtract payload (#296) 2017-11-27 12:16:17 +11:00
Trae Horton 53cf608b7f Add BlueTeamPCAudit payload (#261) 2017-11-23 06:32:45 +11:00
Wesley a48d9e2a61 Updated "Linux Reverse Shell" to v1.2 (#262) 2017-11-22 09:59:18 +11:00
Michael Weinstein 00cee07ec0 Added "Bushings blue turtle" payload (#263) 2017-11-22 09:54:02 +11:00
Prodicode e0abae7179 Added Powershell injection script with Unicorn payload. (#288) 2017-11-22 09:51:59 +11:00
illwill 3a1b26e9c4 Violation of CoC (#294)
* removed due to Code Of Conduct

* removed due to violation of Code of Conduct

* Delete md.ps1

* Delete p.ps1

* violation of coc

* Delete server.py

* violation of coc

* Delete payload.txt

* Delete readme.md

* Delete payload.txt


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete payload.txt


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete RR.ps1


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete background.mp3


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete payload.txt


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete Sherlock.ps1


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete payload.txt


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny

* Delete readme.md


 Deleted due to CoC. 
 please see original code 
 https://github.com/xillwillx/BashBunny
2017-11-20 23:23:52 -08:00
Sebastian Kinne 7097f442d3
Update us.json 2017-11-21 13:02:26 +11:00
danielgohlke dbae32c86d Update win93 prank payload (#291)
Removed usage fixed browsers and added commands to use the default system browser
2017-11-20 14:21:15 +11:00
Mikee 69cd48ee05 Added Startup-Message payload (#260) 2017-11-20 14:20:16 +11:00
ReshephTheGray d65380bd94 New payload GetServicePerm (#290) 2017-11-20 14:16:56 +11:00
RazerBlade f97b75983d Updating PasswordGrabber to make it more easily understandble (#293) 2017-11-20 14:15:12 +11:00
Andrej Šimko 2c49f6c09b Added Czech and Slovak layout (#292)
* Added Czech QWERTZ layout

* Added Slovak QWERTY language layout
2017-11-13 11:40:16 +11:00
semefi 98f6231faa Creating LatinAmerican MX Mapping (#283)
json mapping for the Latin American Spanish
2017-10-31 14:19:55 +11:00
fratervi fc0b43a403 Added Lock PC prank payload (#282) 2017-10-27 09:46:37 +11:00
Sebastian Kinne f8c2edc325 Ensure all extensions are executable 2017-10-27 08:57:48 +11:00
Sebastian Kinne e866ad438b Ensure 'GET TARGET_OS' has access to TARGET_IP 2017-10-27 08:57:22 +11:00
dbuttars12 763639b305 Add win support for prank 93 (#264) 2017-10-26 14:34:04 +11:00