From f5ae0446db3239798d22b64cf3bc4aff643b945d Mon Sep 17 00:00:00 2001 From: salt-or-ester <133813929+salt-or-ester@users.noreply.github.com> Date: Fri, 13 Sep 2024 12:32:16 -0700 Subject: [PATCH] Create tmp --- payloads/library/execution/bypass-buddy/img/tmp | 1 + 1 file changed, 1 insertion(+) create mode 100644 payloads/library/execution/bypass-buddy/img/tmp diff --git a/payloads/library/execution/bypass-buddy/img/tmp b/payloads/library/execution/bypass-buddy/img/tmp new file mode 100644 index 0000000..3f3ae82 --- /dev/null +++ b/payloads/library/execution/bypass-buddy/img/tmp @@ -0,0 +1 @@ +In this DuckyScript™, we explore a method to evade Windows 11's Script Execution Policy protections. The approach involves downloading a script to RAM, then executing it in RAM on-the-fly. This can be accomplished **without** administrative rights.