ee97a0820d
* USB Exfiltration Payload with Win10 Fake Update This Payload exfiltrates defined files to the Bunny. While copying is in progress, it shows a Fake Win10 Update Screen and removes traces. When it's ready, the target machine is forced to reboot. * Correction for the Key injection F11 * Create test * Delete payloads/library/USB_Exfil_with_Fake_Update _and_force-reboot directory * Create tst * Add files via upload * Delete tst * Delete payloads/library/exfiltration/USB Exfil with Fake Update and force reboot directory |
||
---|---|---|
.. | ||
extensions | ||
library | ||
switch1 | ||
switch2 |