bashbunny-payloads/payloads
HackingMark ee97a0820d
USB Exfiltration Payload with Win10 Fake Update V020821 (#455)
* USB Exfiltration Payload with Win10 Fake Update

This Payload exfiltrates defined files to the Bunny. While copying is in progress, it shows a Fake Win10 Update Screen and removes traces. When it's ready, the target machine is forced to reboot.

* Correction for the Key injection F11

* Create test

* Delete payloads/library/USB_Exfil_with_Fake_Update _and_force-reboot directory

* Create tst

* Add files via upload

* Delete tst

* Delete payloads/library/exfiltration/USB Exfil with Fake Update and force reboot directory
2021-09-30 17:08:02 -05:00
..
extensions Extensions: Add wait_for BTLE extensions 2021-07-01 16:29:44 +01:00
library USB Exfiltration Payload with Win10 Fake Update V020821 (#455) 2021-09-30 17:08:02 -05:00
switch1 Update default payloads to avoid confusion 2017-04-07 12:42:08 +10:00
switch2 Update default payloads to avoid confusion 2017-04-07 12:42:08 +10:00