commit
936469ed0d
|
@ -1,7 +1,7 @@
|
||||||
###############################KeyLogin#####################################
|
###############################KeyLogin#####################################
|
||||||
# Version 1.1
|
# Version 1.1
|
||||||
# OS: Windows
|
# OS: Windows
|
||||||
# Author: 0iphor13
|
# Author: 0i41E
|
||||||
# Discription: This extremely simple payload will lock the targets machine and will wait for it to insert the password.
|
# Discription: This extremely simple payload will lock the targets machine and will wait for it to insert the password.
|
||||||
# Afterwards these will be exfiltrated to your CloudC2 instance. The most covert technique to get clear text credentials!
|
# Afterwards these will be exfiltrated to your CloudC2 instance. The most covert technique to get clear text credentials!
|
||||||
#
|
#
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
**Title: KeyLogin**
|
**Title: KeyLogin**
|
||||||
|
|
||||||
<p>Author: 0iphor13<br>
|
<p>Author: 0i41E<br>
|
||||||
OS: Windows<br>
|
OS: Windows<br>
|
||||||
Version: 1.1<br>
|
Version: 1.1<br>
|
||||||
Requirements: CloudC2 Instance</p>
|
Requirements: CloudC2 Instance</p>
|
||||||
|
@ -25,10 +25,10 @@ There you go, login credentials, exfiltrated in an automated manner, without the
|
||||||
|
|
||||||
KeyCroc will Notify you of the current attack state
|
KeyCroc will Notify you of the current attack state
|
||||||
|
|
||||||
![alt text](https://github.com/0iphor13/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/notifications.png)
|
![alt text](https://github.com/0i41E/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/notifications.png)
|
||||||
|
|
||||||
KeyCroc will save the inserted credentials into a seperate file for you
|
KeyCroc will save the inserted credentials into a seperate file for you
|
||||||
![alt text](https://github.com/0iphor13/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/loot.png)
|
![alt text](https://github.com/0i41E/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/loot.png)
|
||||||
|
|
||||||
|
|
||||||
Credit for support:
|
Credit for support:
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
##########################ReverseCroc#################################
|
##########################ReverseCroc#################################
|
||||||
# Version 1.0
|
# Version 1.0
|
||||||
# OS: Windows / Linux(?) (Not tested with Powershell on Linux)
|
# OS: Windows / Linux(?) (Not tested with Powershell on Linux)
|
||||||
# Author: 0iphor13
|
# Author: 0i41E
|
||||||
|
|
||||||
################Reverse shell executed in the background################
|
################Reverse shell executed in the background################
|
||||||
################Fill in Attacker-IP and Port in Line 19#################
|
################Fill in Attacker-IP and Port in Line 19#################
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
#######################################################SpearPhishCroc############################################################
|
#######################################################SpearPhishCroc############################################################
|
||||||
# Version 1.0
|
# Version 1.0
|
||||||
# OS: Windows
|
# OS: Windows
|
||||||
# Author: 0iphor13
|
# Author: 0i41E
|
||||||
# Idea and code based on Invoke-CredentialsPhish from Nikhil Mittal
|
# Idea and code based on Invoke-CredentialsPhish from Nikhil Mittal
|
||||||
################Trigger a popup, demanding for valid credentials, popup can't be closed without valid credentials################
|
################Trigger a popup, demanding for valid credentials, popup can't be closed without valid credentials################
|
||||||
MATCH phishy
|
MATCH phishy
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
###############################RemoteDeskCroc#####################################
|
###############################RemoteDeskCroc#####################################
|
||||||
# Version 1.0
|
# Version 1.0
|
||||||
# OS: Windows / Linux(?) (Not tested with Powershell on Linux)
|
# OS: Windows / Linux(?) (Not tested with Powershell on Linux)
|
||||||
# Author: 0iphor13
|
# Author: 0i41E
|
||||||
# Discription: This payload will give you screen access to your victims machine.
|
# Discription: This payload will give you screen access to your victims machine.
|
||||||
# Combined with KeyCrocs ability to type in commands, you have basically RemoteDesktop.
|
# Combined with KeyCrocs ability to type in commands, you have basically RemoteDesktop.
|
||||||
#
|
#
|
||||||
|
|
Loading…
Reference in New Issue