* Local hosts DNS spoofing attack
This is a simple hosts DNS spoofin attack, where the target gets redirected to a set IP when going to a certain website.
* Create README.md
* Update README.md
When no Internet connection is available the command runs into an error:
"The remote name could not be resolved: 'ipinfo.io'"
Fixed this with a try and catch block
The command also runs into an error when Internet Explorer was never started.
"Invoke-WebRequest : The response content cannot be parsed because the Internet Explorer engine is not available, or Internet Explorer's first-launch configuration is not complete. Specify the
UseBasicParsing parameter and try again"
Fixed this with the -UseBasicParsing parameter
* USB Intruder
Initial upload of the USB Intruder v1.1
Tested on Windows 7 and Windows 10.
* USB Intruder
Updated Readme.
Forgot to add a line.
* Update...again...
Added link for forum comments/discussion.
* USB Intruder
USB Intruder v1.1 Commit.
the existing `get-Culture | Select -ExpandProperty Name` in `SETKB DONE` returned to en-GB by default
changed to `Get-WinSystemLocale | Select -ExpandProperty Name` to restore to the System Locale set by the User
* Powershell SMB Delivery
* fixed smbserver.py call
* Updated to use HID and RNDIS_ETHERNET at the same time. Upgraded to Golang webserver
* Removed binary
* WifiPass payload
Based on the WiFiCreds payload, with a focus on WPA networks and wider OS scope.
* Lights
Solid rather than blinking
* Extra comment
* Update payload.txt
* Create readme.md
* Update readme.md
* Update payload.txt
* Update readme.md
* Update readme.md
* Update readme.md
* Update readme.md
* Fixed for 1.0 and 1.1
Fixed the payload for 1.0 but if you want it ported for 1.1, change line 38 to (LED M)
* Made 1.1 compatible.
Still need to examine Get-BrowserData.ps1
* Mac Reverse Shell
Starts a terminal window on a Mac,then creates a bash reverse shell inside a script, s.sh. It then runs the script in the background and closes the terminal window.
* Added variables for IP and Port of the Netcat Listener
For ease of use, variables were added at the top for the IP Address and Port of the Netcat Listener. Change those values to your listener and no other edits should be needed.
* Added persistence (and a reason to have a dropper)
This payload creates a bash reverse shell inside a script and adds persistence by adding the script to the Mac Launch Agent at a user defined interval.
* Mac Reverse Shell
Starts a terminal window on a Mac,then creates a bash reverse shell inside a script, s.sh. It then runs the script in the background and closes the terminal window.
* Added variables for IP and Port of the Netcat Listener
For ease of use, variables were added at the top for the IP Address and Port of the Netcat Listener. Change those values to your listener and no other edits should be needed.
* Added persistence (and a reason to have a dropper)
This payload creates a bash reverse shell inside a script and adds persistence by adding the script to the Mac Launch Agent at a user defined interval.
* Fixed additional MacReverseShell
* Added readme.md files
* Added readme.md files
* Added readme.md
* Added readme.md files
* Added readme.md files
* Updated for firmware 1.1
* Updated for firmware 1.1
* Added ThemeChanger and updated for firmware 1.1
* Updated readme.md
* Updated for firmware 1.1 - using RUN command
* Fixed issues with the new RUN - reverted
* Fixed a few script problems
* removed binary and updated readme.md
* added a check for themepack
* edited themechanger readme
* updated readme.md and version
Undercover bunny is a Bash Bunny script that creates a wifi network when connected using the hosts internet connection.
Added LED's
Update Undercover Bunny
Rename Undercover Bunny to payload.txt
Moved UndercoverBunny into the correct payload folder
* Updated for firmware version 1.1
Updated version number.
Updated LED status table.
* Update Ducky Template for firmware 1.1
Updated LED statuses
Updated language to DUCKY_LANG
removed 'source bunny_helpers.sh' and used 'GET SWITCH_POSITION' instead.
* Fix DUCKY_LANG vs. DUCK_LANG typo
Fix typo pointed out by Sebkinne
* Update payload.txt
* DumpCreds Version 2.1
- new payload.txt special for BashBunny FW 1.1
- minor changes in main.ps1
- insert some code for debugging
* Updadet becaus new fork sync
* new payload.txt special for BashBunny FW 1.1
+ minor changes in main.ps1
+ insert some code for debugging
* Adding the MacPhish payload, uses HID and STORAGE modes on BashBunny. For OS X, uses spotlight to launch terminal, then uses osascript command to phish for the users password, then saves the phished password back to the bashbunny.
* Update readme.md