TheDragonkeeper
81317d83b1
Update runpayload.sh
2019-06-28 22:08:44 +01:00
TheDragonkeeper
066b7846da
Rename payload.sh to runpayload.sh
2019-06-28 22:03:48 +01:00
TheDragonkeeper
bed7de2cd4
Update payload.sh
2019-04-08 19:16:09 +01:00
TheDragonkeeper
f573cb9b0b
Create payload.sh
2019-04-08 18:43:01 +01:00
Kamots
6760498c27
Created waiteject.sh to wait on USB storage eject. ( #374 )
2019-03-29 15:03:54 -07:00
Darren Kitchen
7c8fbf0f41
Extension by Raf
2019-03-26 18:28:18 -07:00
G4te-Keep3r
502576d7ed
Made ALTCODE-TRANSCODER. ( #373 )
...
* Response to Hak5 2506
* A random 'e' ended up on line 58.
Line is blank now like it is supposed to be.
* Created readme
STAGE2 made more sense when it was STAGE1/STAGE2, but the transcoding is a special stage and the typing is stage 2 since the transcoding had to be done first.
2019-02-13 12:41:46 -08:00
Darren Kitchen
b1309229cc
Added ALTCODE demo payload
2019-02-06 18:19:47 -08:00
Darren Kitchen
d341068548
Added dropbox exfiltrator PoC payload
2019-01-30 12:17:55 -08:00
Joel Tyler
55c7d4f706
Added Discord Server. ( #370 )
2019-01-24 10:28:29 -08:00
Rosius Yves
0ee25f8d0d
Update payload.txt ( #365 )
...
Some more shortening. Only 183 characters!
powershell -w h "$p=$home+'\b.jpg';iwr h4k.cc/b.jpg -O $p;SP 'HKCU:Control Panel\Desktop' WallPaper $p;1..59|%{RUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters ,1 ,True;sleep 1}"
* Omit http:// from URI
* powershell -w h to start a hidden powershell windows
* set variable $p for later re-use (saves characters)
* Omit -Uri and redundant characters in -Outfile (-O)
switches
* 1..59|% to create a loop for 60 seconds
* use $home as directory
2019-01-22 23:24:56 -08:00
Darren Kitchen
0273c87be2
Added key code spammer test payload
2019-01-22 23:22:21 -08:00
Darren Kitchen
9687a8d830
Added cross platform lockout payload
2019-01-16 17:57:32 -08:00
Darren Kitchen
d386f07d8e
Added wallpaper prank payload re: Hak5 episode 2502
2019-01-09 10:58:36 -08:00
Darren Kitchen
820576a103
Updated title
2019-01-01 14:37:25 -08:00
Darren Kitchen
e61d58d488
Added the cross platform continuous locker payload
2019-01-01 14:36:44 -08:00
metalkey
ee48a74dc6
Added readme ( #337 )
...
Updated author details
2018-06-04 13:31:43 +10:00
golem445
9fab25740d
Bunnyhound and Quickdraw added ( #343 )
...
* Add files via upload
Initial payload
* Add files via upload
Initial payload
2018-05-20 14:23:53 -07:00
golem445
be78dafbfc
Add files via upload ( #342 )
2018-05-20 11:29:10 -07:00
metalkey
65d652a15c
Add Hershell Encrypted Reverse shell payload ( #335 )
2018-04-11 21:21:40 +10:00
Darren Kitchen
032061688d
WAIT extension pauses until switch position changes
2018-01-30 22:10:24 -08:00
Aidan Holland
4df763c4a4
Update mac_happy extension ( #319 )
2018-01-31 09:17:56 +11:00
Aidan Holland
38a7460fe6
Update GET TARGET_OS so it works with AUTO_ETHERNET ( #320 )
2018-01-31 09:17:09 +11:00
Aidan Holland
5f31a0be02
Fix README.md ( #321 )
2018-01-31 09:16:23 +11:00
Tudor Gheorghiu
9011db7fae
Update unicorn readme.md ( #302 )
2018-01-28 10:27:46 +11:00
Alex Flores
6345354375
Added chrome extension installer payload ( #315 )
...
- uses new AUTOETHERNET attackmode
- uses new GET TARGET_OS functionality
- uses new DEBUG function
- uses new MAC_HAPPY extension
2018-01-28 10:26:53 +11:00
Alex Flores
65ad5f6e89
fixes mac_happy extension ( #313 )
...
- fixes state leakage of `command` variable by removing it
- remove unecessary use of forked processes/sub-commands
- combine input validation conditionals
- match the standard of existing extensions of exporting function
names as all caps
- bump version number
2018-01-28 10:25:55 +11:00
bg-wa
920ff7fa67
New options for optical exfil payload ( #317 )
2018-01-28 10:24:58 +11:00
bg-wa
81e6d536dd
Added Optical Exfiltration Payload ( #316 )
2018-01-27 15:47:39 +11:00
Alex Flores
b37aed0edc
fixes debug extention ( #312 )
...
- resolve sytax errors with variable declarations
- resolve misuse of command substition / variabl dereferencing
- internal functions were being called before being declared
- remove superfluous file existence checks
2018-01-24 06:12:30 +11:00
KeenanV
7f902403d4
Persistent Reverse Shells for MacOS and Windows 10 ( #306 )
2018-01-22 10:39:14 +11:00
c64whiz
a998f5c86c
Add random interval to InfiniteControl payload ( #310 )
2018-01-22 10:38:38 +11:00
Simon Dankelmann
b644446f40
Added German umlauts to de.json ( #311 )
2018-01-22 10:37:26 +11:00
Jonathan Debétaz
940dc09043
Payload updates ( #309 )
2018-01-15 15:36:49 +10:00
bg-wa
650772e9e4
Added debug extension ( #155 )
2018-01-10 08:22:29 +10:00
Thorsten Sick
f8a442e66d
Proof-of-concept added: EICAR of bash bunny HID simulation for Linux ( #298 )
2017-12-12 19:12:36 +11:00
danthegoodman1
6fa5887aae
Addition of Exfiltration payload ( #300 )
2017-12-12 19:11:25 +11:00
Thorsten Sick
fae8746466
Added "Info Grabber for Linux" payload ( #299 )
2017-12-08 07:13:14 +11:00
saintcrossbow
08c24c4389
Added SmartFileExtract payload ( #296 )
2017-11-27 12:16:17 +11:00
Trae Horton
53cf608b7f
Add BlueTeamPCAudit payload ( #261 )
2017-11-23 06:32:45 +11:00
Wesley
a48d9e2a61
Updated "Linux Reverse Shell" to v1.2 ( #262 )
2017-11-22 09:59:18 +11:00
Michael Weinstein
00cee07ec0
Added "Bushings blue turtle" payload ( #263 )
2017-11-22 09:54:02 +11:00
Prodicode
e0abae7179
Added Powershell injection script with Unicorn payload. ( #288 )
2017-11-22 09:51:59 +11:00
illwill
3a1b26e9c4
Violation of CoC ( #294 )
...
* removed due to Code Of Conduct
* removed due to violation of Code of Conduct
* Delete md.ps1
* Delete p.ps1
* violation of coc
* Delete server.py
* violation of coc
* Delete payload.txt
* Delete readme.md
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete RR.ps1
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete background.mp3
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete Sherlock.ps1
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete payload.txt
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
* Delete readme.md
Deleted due to CoC.
please see original code
https://github.com/xillwillx/BashBunny
2017-11-20 23:23:52 -08:00
Sebastian Kinne
7097f442d3
Update us.json
2017-11-21 13:02:26 +11:00
danielgohlke
dbae32c86d
Update win93 prank payload ( #291 )
...
Removed usage fixed browsers and added commands to use the default system browser
2017-11-20 14:21:15 +11:00
Mikee
69cd48ee05
Added Startup-Message payload ( #260 )
2017-11-20 14:20:16 +11:00
ReshephTheGray
d65380bd94
New payload GetServicePerm ( #290 )
2017-11-20 14:16:56 +11:00
RazerBlade
f97b75983d
Updating PasswordGrabber to make it more easily understandble ( #293 )
2017-11-20 14:15:12 +11:00
Andrej Šimko
2c49f6c09b
Added Czech and Slovak layout ( #292 )
...
* Added Czech QWERTZ layout
* Added Slovak QWERTY language layout
2017-11-13 11:40:16 +11:00