mirror of https://github.com/hak5/omg-payloads.git
commit
f4d54cfebe
|
@ -1,6 +1,6 @@
|
||||||
**Title: SamDumpCable**
|
**Title: SamDumpCable**
|
||||||
|
|
||||||
<p>Author: 0iphor13<br>
|
<p>Author: 0i41E<br>
|
||||||
OS: Windows<br>
|
OS: Windows<br>
|
||||||
Version: 1.0<br>
|
Version: 1.0<br>
|
||||||
Requirements: OMG Firmware v.2.5 or higher</p>
|
Requirements: OMG Firmware v.2.5 or higher</p>
|
||||||
|
@ -23,4 +23,4 @@ Afterwards you can use a tool like samdump2 to extract the users hashes.</p>
|
||||||
|
|
||||||
**!Disclaimer! samdump2 has proven to be unreliable in the recent past.**
|
**!Disclaimer! samdump2 has proven to be unreliable in the recent past.**
|
||||||
|
|
||||||
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png)
|
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png)
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
REM Title: SamDumpCable
|
REM Title: SamDumpCable
|
||||||
REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like samdump2, to get the users hashes.
|
REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like samdump2, to get the users hashes.
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
REM Version: 1.0
|
REM Version: 1.0
|
||||||
REM Category: Credentials
|
REM Category: Credentials
|
||||||
REM Requirements: OMG Firmware v.2.5 or higher
|
REM Requirements: OMG Firmware v.2.5 or higher
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM Ai-Cable
|
REM Ai-Cable
|
||||||
REM Version 2.0
|
REM Version 2.0
|
||||||
REM OS: MULTI (Tested with the OMG-Plug on Google Chrome/Windows 10 at screen resolution 1920 x 1080)
|
REM OS: MULTI (Tested with the OMG-Plug on Google Chrome/Windows 10 at screen resolution 1920 x 1080)
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
|
|
||||||
REM This payload will write its own payload, until you kill it! Maybe, if you wait long enough, it will create a payload of the month...
|
REM This payload will write its own payload, until you kill it! Maybe, if you wait long enough, it will create a payload of the month...
|
||||||
REM Click run and let it happen, don't move! Might not work properly on every system due to timings, screen resolution, etc...
|
REM Click run and let it happen, don't move! Might not work properly on every system due to timings, screen resolution, etc...
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
**Title: FodCable - UAC Bypass**
|
**Title: FodCable - UAC Bypass**
|
||||||
|
|
||||||
Author: 0iphor13
|
Author: 0i41E
|
||||||
|
|
||||||
Version: 1.0
|
Version: 1.0
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
**Title: FodCableII - UAC Bypass**
|
**Title: FodCableII - UAC Bypass**
|
||||||
|
|
||||||
<p>Author: 0iphor13<br>
|
<p>Author: 0i41E<br>
|
||||||
Version: 1.0<br>
|
Version: 1.0<br>
|
||||||
Requirements: OMG Firmware v.2.5 or higher</p>
|
Requirements: OMG Firmware v.2.5 or higher</p>
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM FodCableII
|
REM FodCableII
|
||||||
REM Version 1.0
|
REM Version 1.0
|
||||||
REM OS: Windows
|
REM OS: Windows
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
REM Requirements: OMG Firmware v.2.5 or higher
|
REM Requirements: OMG Firmware v.2.5 or higher
|
||||||
|
|
||||||
REM Using FodHelper.exe to bypass UAC and get an elevated shell
|
REM Using FodHelper.exe to bypass UAC and get an elevated shell
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
**Title: Windows11_CommandPrompt_Downgrade**
|
**Title: Windows11_CommandPrompt_Downgrade**
|
||||||
|
|
||||||
<p>Author: 0iphor13<br>
|
<p>Author: 0i41E<br>
|
||||||
OS: Windows11<br>
|
OS: Windows11<br>
|
||||||
Version: 1.0<br>
|
Version: 1.0<br>
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM Windows11_CommandPrompt_Downgrade
|
REM Windows11_CommandPrompt_Downgrade
|
||||||
REM Version 1.0
|
REM Version 1.0
|
||||||
REM OS: Windows11
|
REM OS: Windows11
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
REM Requirements: OMG Firmware v.3.0 or higher
|
REM Requirements: OMG Firmware v.3.0 or higher
|
||||||
REM Changing the Command Prompt to Conhost, to enable hidden Powershell for certain W11 Builds.
|
REM Changing the Command Prompt to Conhost, to enable hidden Powershell for certain W11 Builds.
|
||||||
REM Other Methods values are also provided for backup or simply playing around.
|
REM Other Methods values are also provided for backup or simply playing around.
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM OMG-AwarenessTraining
|
REM OMG-AwarenessTraining
|
||||||
REM Version 1.1
|
REM Version 1.1
|
||||||
REM OS: Windows
|
REM OS: Windows
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
|
|
||||||
REM A small message box, telling the user that he violated the security policy. The hostname of the user will be send to a webhook to report the incident
|
REM A small message box, telling the user that he violated the security policy. The hostname of the user will be send to a webhook to report the incident
|
||||||
REM Fill in the (Web)hook URL, in LINE 31, where the hostname should be reported to.
|
REM Fill in the (Web)hook URL, in LINE 31, where the hostname should be reported to.
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM Setup-Automation
|
REM Setup-Automation
|
||||||
REM Version 1.0
|
REM Version 1.0
|
||||||
REM OS: Multi
|
REM OS: Multi
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
|
|
||||||
REM If you need to setup multiple cables via the python flasher, this might save you some time.
|
REM If you need to setup multiple cables via the python flasher, this might save you some time.
|
||||||
REM Make sure that another cable/plug/adapter is connected via programmer!
|
REM Make sure that another cable/plug/adapter is connected via programmer!
|
||||||
|
|
|
@ -105,7 +105,7 @@ Arf
|
||||||
|
|
||||||
* [Hak5](https://hak5.org/)
|
* [Hak5](https://hak5.org/)
|
||||||
* [MG](https://github.com/OMG-MG)
|
* [MG](https://github.com/OMG-MG)
|
||||||
* [0iphor13](https://github.com/0iphor13)
|
* [0i41E](https://github.com/0i41E)
|
||||||
* [PhilSutter](https://github.com/PhilSutter)
|
* [PhilSutter](https://github.com/PhilSutter)
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -95,7 +95,7 @@ Arf
|
||||||
|
|
||||||
* [Hak5](https://hak5.org/)
|
* [Hak5](https://hak5.org/)
|
||||||
* [MG](https://github.com/OMG-MG)
|
* [MG](https://github.com/OMG-MG)
|
||||||
* [0iphor13](https://github.com/0iphor13)
|
* [0i41E](https://github.com/0i41E)
|
||||||
* [PhilSutter](https://github.com/PhilSutter)
|
* [PhilSutter](https://github.com/PhilSutter)
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ REM OMGHoax
|
||||||
REM Version 1.0
|
REM Version 1.0
|
||||||
REM OS: Windows
|
REM OS: Windows
|
||||||
REM Author: rf_bandit
|
REM Author: rf_bandit
|
||||||
REM Thank You: t3l3machus, 0iphor13
|
REM Thank You: t3l3machus, 0i41E
|
||||||
REM Requirements: Firmware Version 3.0+
|
REM Requirements: Firmware Version 3.0+
|
||||||
|
|
||||||
REM Simple way to use the Hoaxshell standalone listener with OMG cables/plug
|
REM Simple way to use the Hoaxshell standalone listener with OMG cables/plug
|
||||||
|
|
|
@ -15,7 +15,7 @@
|
||||||
# You should have received a copy of the GNU General Public License
|
# You should have received a copy of the GNU General Public License
|
||||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
#
|
#
|
||||||
# Modified by 0iphor13 for PingZhellCable
|
# Modified by 0i41E for PingZhellCable
|
||||||
#
|
#
|
||||||
#
|
#
|
||||||
#
|
#
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
**Title: PingZhellCable**
|
**Title: PingZhellCable**
|
||||||
|
|
||||||
<p>Author: 0iphor13<br>
|
<p>Author: 0i41E<br>
|
||||||
OS: Windows<br>
|
OS: Windows<br>
|
||||||
Version: 1.1<br>
|
Version: 1.1<br>
|
||||||
Requirements: OMG Firmware v.2.5 or higher</p>
|
Requirements: OMG Firmware v.2.5 or higher</p>
|
||||||
|
@ -28,7 +28,7 @@ Disable ICMP replies by the OS:
|
||||||
`sysctl -w net.ipv4.icmp_echo_ignore_all=1`
|
`sysctl -w net.ipv4.icmp_echo_ignore_all=1`
|
||||||
|
|
||||||
Start the client -> `perl PingZhellClient.pl`
|
Start the client -> `perl PingZhellClient.pl`
|
||||||
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png)
|
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png)
|
||||||
|
|
||||||
<p>!!!Insert the IP of your attacking machine into the payload variable $IP!!!<br>
|
<p>!!!Insert the IP of your attacking machine into the payload variable $IP!!!<br>
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM PingZhellCable
|
REM PingZhellCable
|
||||||
REM Version 1.1
|
REM Version 1.1
|
||||||
REM OS: Windows
|
REM OS: Windows
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
REM Requirements: OMG Firmware v.2.5 or higher
|
REM Requirements: OMG Firmware v.2.5 or higher
|
||||||
|
|
||||||
REM Getting remote access via ICMP
|
REM Getting remote access via ICMP
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
**Title: RemoteDeskCable**
|
**Title: RemoteDeskCable**
|
||||||
|
|
||||||
<p>Author: 0iphor13<br>
|
<p>Author: 0i41E<br>
|
||||||
OS: Windows<br>
|
OS: Windows<br>
|
||||||
Version: 3.0<br>
|
Version: 3.0<br>
|
||||||
Requirements: OMG Firmware v.3.0 or higher</p>
|
Requirements: OMG Firmware v.3.0 or higher</p>
|
||||||
|
@ -17,5 +17,5 @@ What is RemoteDeskCable?
|
||||||
- Plug in your Cable/Plug/Adapter - run away
|
- Plug in your Cable/Plug/Adapter - run away
|
||||||
- Use a browser supporting MJPEG, like FireFox, and visit 127.0.0.1:#PORT.
|
- Use a browser supporting MJPEG, like FireFox, and visit 127.0.0.1:#PORT.
|
||||||
- Fire up the payload for the screenshare to appear within FireFox.
|
- Fire up the payload for the screenshare to appear within FireFox.
|
||||||
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png)
|
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png)
|
||||||
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png)
|
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png)
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM Title: RemoteDeskCable
|
REM Title: RemoteDeskCable
|
||||||
REM Version: 3.0
|
REM Version: 3.0
|
||||||
REM OS: Windows
|
REM OS: Windows
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
REM Description: Get remote screen access to view targets screen.
|
REM Description: Get remote screen access to view targets screen.
|
||||||
REM Requirements: Firmware Version 3.0 min
|
REM Requirements: Firmware Version 3.0 min
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM ReverseCableII
|
REM ReverseCableII
|
||||||
REM Version 1.0
|
REM Version 1.0
|
||||||
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
|
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
|
|
||||||
REM UDP Reverse shell, based on ReverseDuckyIII, executed in the background. Might create a firewall pop up, but will execute anyway.
|
REM UDP Reverse shell, based on ReverseDuckyIII, executed in the background. Might create a firewall pop up, but will execute anyway.
|
||||||
REM Fill in Attacker-IP and Port in Line 20
|
REM Fill in Attacker-IP and Port in Line 20
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM ReverseCable
|
REM ReverseCable
|
||||||
REM Version 2.0
|
REM Version 2.0
|
||||||
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
|
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
REM Requirements: Firmware Version 3.0 or higher
|
REM Requirements: Firmware Version 3.0 or higher
|
||||||
|
|
||||||
REM TCP Reverse shell, based on ReverseDuckyII, executed in the background
|
REM TCP Reverse shell, based on ReverseDuckyII, executed in the background
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
**Title: ReverseCableSSL**
|
**Title: ReverseCableSSL**
|
||||||
|
|
||||||
<p>Author: 0iphor13<br>
|
<p>Author: 0i41E<br>
|
||||||
OS: Windows<br>
|
OS: Windows<br>
|
||||||
Version: 2.0<br>
|
Version: 2.0<br>
|
||||||
Requirements: OMG Firmware v.3.0 or higher</p>
|
Requirements: OMG Firmware v.3.0 or higher</p>
|
||||||
|
@ -24,5 +24,5 @@ I recommend openssl itself or ncat - Example syntax for both:<br>
|
||||||
|
|
||||||
- Plug in Cable.
|
- Plug in Cable.
|
||||||
|
|
||||||
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png)
|
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png)
|
||||||
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg)
|
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg)
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
REM ReverseCableSSL
|
REM ReverseCableSSL
|
||||||
REM Version 2.0
|
REM Version 2.0
|
||||||
REM OS: Windows
|
REM OS: Windows
|
||||||
REM Author: 0iphor13
|
REM Author: 0i41E
|
||||||
REM Requirements: OMG Firmware v.3.0 or higher
|
REM Requirements: OMG Firmware v.3.0 or higher
|
||||||
|
|
||||||
REM Getting encrypted remote access via powershell
|
REM Getting encrypted remote access via powershell
|
||||||
|
|
Loading…
Reference in New Issue