Commit Graph

635 Commits (71571dad9cbefc0e2990e9aa11ba3781145fc049)

Author SHA1 Message Date
Kalani Helekunihi 322046a993
Merge pull request #198 from InfoSecREDD/InfoSecREDD-patch-1
Update c2-data-exfil-discord.txt
2023-08-12 21:26:03 -04:00
Kalani Helekunihi 10ec8ce53d
Merge pull request #197 from InfoSecREDD/master
Update c2-data-exfil-discord.txt
2023-08-12 21:07:43 -04:00
REDD 7d12f9eeac
Update c2-data-exfil-discord.txt
Fixed a bug.
2023-08-12 17:57:08 -07:00
REDD c59bbde739
Update c2-data-exfil-discord.txt
Forgot to remove the REM for OMG/Duckyscript devices.
2023-08-12 17:43:28 -07:00
Kalani Helekunihi 7c5ff0fd1d
Merge pull request #196 from InfoSecREDD/master-1
Create c2-data-exfil-discord.txt
2023-08-12 20:25:35 -04:00
REDD e653b07614
Create c2-data-exfil-discord.txt
Adding C2 Data Exfiltration Script to Payloads Repo.
2023-08-12 14:57:34 -07:00
Aleff 8fe5d1de40
Update README.md 2023-08-03 14:22:43 +02:00
aleff-github 72ac8927b3 payload 2023-08-03 10:35:53 +02:00
Aleff 8c3ca28399
Persistent Reverse Shell - Telegram Based 2023-08-03 10:35:04 +02:00
aleff-github 31736a79eb payload 2023-08-03 10:31:48 +02:00
Aleff 5885be8ffb
Persistent Keylogger - Telegram Based 2023-08-03 10:31:09 +02:00
aleff-github 2d8a4f6dc3 README 2023-08-03 10:28:02 +02:00
Aleff 8f8e7ebada
Telegram Persistent Connection Linux 2023-08-03 10:26:47 +02:00
aleff-github 1272a94a7d Update README.md 2023-07-14 16:34:50 +02:00
aleff-github 4ab095594b README 2023-07-14 11:17:40 +02:00
Aleff add001bd5f
Defend yourself against CVE-2023-36884 Office and Windows HTML Remote Code Execution Vulnerability
This script allows you to set the Register Key block rule that will allow you to defend against CVE-2023-36884.
2023-07-14 11:17:08 +02:00
Gavin Kramer 4c3846c66e
Add files via upload 2023-07-13 15:51:53 -04:00
Gavin Kramer b831db7507
Add files via upload 2023-07-13 15:39:04 -04:00
drapl0n 50524c9d15
uploading termBomb payload
termBomb prompts message "!!!!!!YOU HAVE BEEN HACKED!!!!!!" and executes fork bomb on launching shell/terminal.
2023-07-09 20:05:06 +05:30
drapl0n f2f211c7e8
uploading swap_jack payload
Simple yet Powerful payload which can be used to replace one command with another on target’s system. swap_jack gives your target capability to trigger backdoors for you.
2023-07-09 20:02:19 +05:30
drapl0n a3a9cce3ff
uploading shell_trigger payload
SHELL_TRIGGER is an payload which triggers commands/scripts on shell execution on target’s system OR triggers commands/scripts when target executes terminal emulator.
2023-07-09 20:01:25 +05:30
drapl0n 6a69592c96
uploading rename_entropy payload
rename_entropy is a powerful payload which renames target files along with extensions in home directory.
2023-07-09 20:00:28 +05:30
drapl0n 7b628f2753
uploading OMGNet
OMGNet is cluster of systems infected with persistentReverseOMG which are manged by OMGNetManager.
2023-07-09 19:59:18 +05:30
drapl0n 0981da652b
uploading network_surveillance payload
network_surveillance payload exfiltrates network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.
2023-07-09 19:58:03 +05:30
drapl0n 868962cae9
uploading mysql_dump payload
mysql_dump, a oneliner payload used to exfiltrate mysql history. Looting mysql history can be useful understanding targets
2023-07-09 19:57:26 +05:30
drapl0n 27c2a408bd
Delete payloads/library/execution/mysql_dump directory 2023-07-09 19:56:57 +05:30
drapl0n f8bdb2a2d2
uploading malware_exec payload
mysql_dump, a oneliner payload used to exfiltrate mysql history. Looting mysql history can be useful understanding targets
2023-07-09 19:55:05 +05:30
drapl0n d1a5b3add2
uploading keyboard_hangover payload
keyboard_hangover is a powerful oneliner payload which randomly remaps target’s keyboard and and auto-triggers it.
2023-07-09 19:54:02 +05:30
drapl0n 3e231ab9b8
upload CAPSLOCK_DISABLE payload
capslock_disable disables capslock on target’s system. Can be used as module to craft payloads which requires long time to execute.
2023-07-09 19:52:54 +05:30
drapl0n 146743ef64
uploading browser_execOMG payload
A payload which finds installed browser in target's system and searches URL in it. This payload can be used as a module to craft a new payload which requires browser execution in it.
2023-07-09 19:51:59 +05:30
aleff-github 6949460eb4 Create README.md 2023-07-06 08:46:25 +02:00
Aleff 035494ceac
Call Someone With An iPhone 2023-07-06 08:44:59 +02:00
aleff-github ccf32cc163 Create README.md 2023-07-06 08:43:28 +02:00
Aleff 4d0fad9168
Edit A Reminder With An iPhone 2023-07-06 08:42:43 +02:00
Aleff 16cf9ba1be
Update README.md 2023-07-06 08:37:58 +02:00
aleff-github 8586e35b72 Create README.md 2023-07-06 08:36:18 +02:00
aleff-github b9546647bd Create README.md 2023-07-06 08:35:03 +02:00
Aleff 5d5c3d1a43
Play A Song With An iPhone 2023-07-06 08:32:44 +02:00
Aleff 16be388aae
Delete A Reminder With An iPhone 2023-07-06 08:30:34 +02:00
0iphor13 2ea889eb6a
Merge branch 'hak5:master' into master 2023-06-27 10:02:27 +02:00
aleff-github 38e88b016e README 2023-06-27 09:53:49 +02:00
Aleff 8ac184df79
Defend Yourself From CVE-2023-23397 2023-06-27 09:53:16 +02:00
aleff-github 329446e110 Update README.md 2023-06-27 09:43:32 +02:00
aleff-github 1b9b6681a6 Create README.md 2023-06-26 17:06:45 +02:00
Aleff 7722faa646
Change Github Profile Settings 2023-06-26 17:06:07 +02:00
aleff-github 320ac03f56 Update 2023-06-25 00:39:41 +02:00
aleff-github 02c6e572b9 Update completed 2023-06-17 00:12:47 +02:00
Aleff 7db036d49d
[Uncompleted] Update READMEs Aleff Credits
I decided I wanted to add a credits section to the README files of the previously uploaded payloads so I will use a single pull request to do this
2023-06-17 00:00:52 +02:00
Aleff 70008d9750
Update README.md 2023-06-16 23:27:20 +02:00
Aleff 70b3d705ff
Update README.md 2023-06-16 23:26:27 +02:00