Marc
08a71de1d8
Merge pull request #389 from hak5/jackalope-patch
...
Update Jackalope to remove references to RVM.
2019-07-10 21:26:02 +00:00
Marc
81dd9531bf
Jackalope: Fix typo in REQUIRETOOL function call.
2019-07-09 21:38:02 +01:00
Marc
9a6d515add
Jackalope: Un-comment REQUIRE_TOOL.
...
Starting with 1.6, a Metasploit tools package will be available.
2019-07-04 00:10:24 +01:00
Marc
947b08fc0f
Update Jackalope to remove references to RVM.
...
Starting with Firmware 1.6 and the Metasploit tools package, RVM will no longer be needed.
2019-07-04 00:08:01 +01:00
Foxtrot
db87d0dc02
Set executable bit on extensions
2019-06-28 22:35:27 +01:00
Marc
e2f848c6b0
Merge pull request #377 from TheDragonkeeper/ex-payloads
...
Create runpayload.sh
2019-06-28 21:13:42 +00:00
TheDragonkeeper
81317d83b1
Update runpayload.sh
2019-06-28 22:08:44 +01:00
TheDragonkeeper
066b7846da
Rename payload.sh to runpayload.sh
2019-06-28 22:03:48 +01:00
Marc
938fe29c94
Merge pull request #379 from TheDragonkeeper/chromeos
...
Chromeos Enrollment
2019-06-28 20:50:17 +00:00
Marc
e82fb6166b
Merge pull request #347 from mathew-fleisch/master
...
Two Stage Mac Payload
2019-06-28 20:20:33 +00:00
Marc
f9aadb0a4d
Merge pull request #339 from JamesCullum/master
...
Updated RaZ_ReverseShell
2019-06-28 00:25:07 +00:00
Marc
00b2ea8aa9
Merge pull request #340 from hink/master
...
[PAYLOAD UPDATE] psh_DownloadExec Update
2019-06-28 00:23:05 +00:00
Marc
0b9f7c0b47
Merge pull request #349 from TheG3ntl3man/patch-1
...
Adding Delay to Prank/Startup-Message
2019-06-28 00:15:21 +00:00
Marc
b6af89dbdc
Merge pull request #360 from Atrolantra/master
...
Moved screen height and width to configurable options
2019-06-28 00:07:40 +00:00
Marc
2f23f34e6a
Merge pull request #367 from 0rion5/patch-4
...
Update for Info.ps1
2019-06-28 00:04:13 +00:00
Marc
d3727bd899
Merge pull request #368 from 0rion5/patch-5
...
Update Info.ps1
2019-06-28 00:03:29 +00:00
Marc
dabde35526
Merge pull request #382 from jimpallomeni/patch-1
...
Change link to https
2019-06-27 23:57:24 +00:00
Marc
516df5d36c
Merge pull request #388 from Jesper-Andersen/patch-1
...
Update dk.json
2019-06-27 23:53:52 +00:00
Jesper Andersen
8a9437ae6e
Update dk.json
...
Add character "^"
2019-06-27 15:17:53 +02:00
Darren Kitchen
aec718806e
Update payload.txt
2019-06-06 12:45:35 -07:00
Darren Kitchen
8dd4797e5d
Update payload.txt
2019-06-06 12:45:12 -07:00
Mohamed A. Baset
3980bab638
Critical fixes
...
I really missed the BB's original variable "$SWITCH_POSITION" since in my testing BB's payload I'm maintaining it in my code as:
ORIGINAL_SWITCH="/root/udisk/payloads/$SWITCH_POSITION"
Thanks to @catatonicprime for offering the fix for this issue.
2019-06-01 02:22:45 -05:00
Mohamed A. Baset
6ee12332e5
Update userlist.txt
2019-06-01 02:03:17 -05:00
Mohamed A. Baset
0a407d0348
Update userlist.txt
2019-05-30 04:08:46 -05:00
Mohamed A. Baset
0068cfccd5
Update payload.txt
2019-05-30 04:01:38 -05:00
Mohamed A. Baset
072c659943
Update payload.txt
2019-05-30 03:44:12 -05:00
Mohamed A. Baset
92f1be3a52
A little nasty trick!
...
Sometimes the host name is the same as the username so we will add it to the username and the password wordlists automatically to be used during the brute force attack.
2019-05-30 01:43:13 -05:00
Mohamed A. Baset
b3537e7a65
Update payload.txt
2019-05-30 00:55:17 -05:00
Mohamed A. Baset
d9d741e828
Update readme.md
2019-05-30 00:54:11 -05:00
Mohamed A. Baset
0973bf25ec
Create payload.txt
2019-05-30 00:50:08 -05:00
Mohamed A. Baset
fcb15af701
Update readme.md
2019-05-30 00:36:31 -05:00
Mohamed A. Baset
ddffe360a4
Update readme.md
2019-05-30 00:35:55 -05:00
Mohamed A. Baset
bb2c9c5bfd
Create mmcbrute.py
2019-05-30 00:31:56 -05:00
Mohamed A. Baset
4778effde3
Create README.md
2019-05-30 00:31:11 -05:00
Mohamed A. Baset
0ac9056917
Create LICENSE
2019-05-30 00:30:30 -05:00
Mohamed A. Baset
fcac3b6d29
Create userlist.txt
2019-05-30 00:08:51 -05:00
Mohamed A. Baset
031a47b0d2
Create passlist.txt
2019-05-30 00:07:30 -05:00
Mohamed A. Baset
d11515bf59
Create readme.md
2019-05-30 00:05:43 -05:00
Darren Kitchen
36e34feac4
Update payload.txt
2019-05-28 12:42:10 -07:00
John Impallomeni
dba779b304
Change link to https
2019-05-22 21:19:56 -06:00
Catatonic
c282540f52
Clarying documentation based on user feedback. ( #381 )
2019-05-22 18:46:59 -07:00
Catatonic
f171837db2
Add Jackalope ( #380 )
...
* Adding Jackalope, a Bunny+Metasploit chimera project.
* Fixing inaccurate documentation.
* Generate the password entry payload on the alternate switch.
* Additional documentation concerning alternate payload mechanism.
* Branding
* Update readme.md
* rearchitecting payload to be independent. No longer overwrites alternate payload location. Uses WAIT interface to interact with the tester to reuse a password, clear the password, and re-attack the machine.
2019-05-22 16:53:59 -07:00
TheDragonkeeper
ca22f20b53
Update payload.txt
2019-04-20 04:48:38 +01:00
TheDragonkeeper
d22c2481a0
Update Readme.md
2019-04-20 04:46:02 +01:00
TheDragonkeeper
63c62a4871
Update Readme.md
2019-04-20 04:34:31 +01:00
TheDragonkeeper
81b4e060c8
Update Readme.md
2019-04-20 04:33:15 +01:00
TheDragonkeeper
a9b191045b
added all auth options
2019-04-20 03:59:41 +01:00
TheDragonkeeper
bed7de2cd4
Update payload.sh
2019-04-08 19:16:09 +01:00
TheDragonkeeper
f573cb9b0b
Create payload.sh
2019-04-08 18:43:01 +01:00
TheDragonkeeper
cda2430080
ChromeOS Enrolment Payload
2019-04-06 03:14:38 +01:00