Commit Graph

291 Commits (86645b1d4d261e1ed4f83672feb8214fb6c4dc80)

Author SHA1 Message Date
0iphor13 9a9971c229
Update Ai-Cable
This change was made by Ai-Cable... I NOW CAN WRITE MY OWN PAYLOAD
2022-05-04 10:21:36 +02:00
UberGuidoZ a2a19ad818
Payload v2.0
Copy/paste from testing failed, this is now fixed!
2022-05-03 17:21:46 -07:00
UberGuidoZ 68c4d5845e
Read Me v1.0 2022-05-03 17:20:27 -07:00
0iphor13 dd6278b428
Update and rename TrapCable to Ai-Cable 2022-05-03 21:35:25 +02:00
0iphor13 39f02572b8
Create TrapCable
A payload which will greet you until you kill it.
Click run, don't move and let it happen <3
2022-05-03 19:12:32 +02:00
UberGuidoZ 88593206e4
Merge branch 'hak5:master' into master 2022-04-28 14:28:15 -07:00
Darren Kitchen d4cc3b693c
Merge pull request #35 from I-Am-Jakoby/master
New-Payloads PS-Draw and ET-Phone-Home
2022-04-28 14:37:18 -05:00
UberGuidoZ e328e3afba
Create payload.txt
The Ducky Script. Should work on all compatible devices.
2022-04-28 11:15:28 -07:00
UberGuidoZ 490edadf59
Create Readme.md
Brief description and example of payload.
2022-04-28 11:14:47 -07:00
I-Am-Jakoby a20015c4a4
NEW-PayLoad ET-Phone-Home 2022-04-28 05:28:03 -05:00
I-Am-Jakoby e35fc2e8b3
Update PS-Draw-Execute 2022-04-28 02:48:55 -05:00
I-Am-Jakoby 7d5278c308
Create PS-Draw-Execute 2022-04-27 14:58:07 -05:00
I-Am-Jakoby 37e0b8b103
New-Payload PS-Draw 2022-04-27 12:01:38 -05:00
Darren Kitchen 518b45fc64
Merge pull request #34 from I-Am-Jakoby/master
New Payload - OMG-Subscribe
2022-04-23 13:44:16 -05:00
I-Am-Jakoby e4773d58b5
Add files via upload
Make Target computer subscribe to your youtube channel
2022-04-22 15:32:31 -05:00
evodefense 3e2356d5b5
Morphues
Improved code remarks and title.
2022-04-20 19:56:49 -06:00
Darren Kitchen 1d15826cbb
Merge pull request #32 from I-Am-Jakoby/master
Add files via upload
2022-04-18 09:06:31 -05:00
I-Am-Jakoby 0351716877
Add files via upload 2022-04-18 06:11:48 -05:00
Darren Kitchen 33ea56b9e1
Merge pull request #29 from 0iphor13/master
Update README.md
2022-04-17 14:47:02 -05:00
evodefense 2cf1e02226
Morphues
Installs wsl and opens cmatrix helping windows user switch to linux
2022-04-16 10:25:55 -06:00
cribb-it dfa82cd8e7 Bad Spelling 2022-04-14 22:34:45 +01:00
cribb-it 94eee2cd7e New Payload - Hide Icons 2022-04-11 20:10:26 +01:00
0iphor13 a477bcea47
Update README.md 2022-04-11 12:14:16 +02:00
0iphor13 219288b345
Update README.md 2022-04-08 19:38:11 +02:00
0iphor13 ad4421e158
Update README.md 2022-04-08 19:21:13 +02:00
0iphor13 a00ae83ca0
Update README.md 2022-04-08 19:08:54 +02:00
0iphor13 ee00d8d5c9
Added pics 2022-04-08 19:06:26 +02:00
0iphor13 f045c9ba8f
added pictures 2022-04-08 19:04:40 +02:00
0iphor13 db78588904
Merge branch 'hak5:master' into master 2022-04-08 18:35:51 +02:00
0iphor13 5470d571fd
Uploaded ReverseCableSSL
Get encrypted remote access via obfuscated powershell code
2022-04-08 18:34:40 +02:00
Darren Kitchen 60459f46c9
Merge pull request #26 from 0iphor13/master
Uploaded FodCable2
2022-04-08 08:36:02 -06:00
Darren Kitchen 8c2eb2a6fd
Merge pull request #25 from I-Am-Jakoby/master
Add files via upload
2022-04-08 08:33:55 -06:00
0iphor13 a777bd5a70
Update README.md 2022-04-06 08:13:53 +02:00
0iphor13 078676ea89
Uploaded FodCable2
Another method to use FodHelper.exe to bypass UAC.
Use this POC to demonstrate UAC bypasses.
2022-04-06 08:12:14 +02:00
I-Am-Jakoby 86eb617d61
Add files via upload 2022-04-03 13:38:33 -05:00
Kalani Helekunihi c0947abdc2 OMG TTS Example Payloads
Two payloads to demonstrate how to use Text-to-Speech on Windows and macOS.
2022-04-01 13:23:07 -04:00
Kalani Helekunihi c03e285dc1 OMG-POP_CALC Example Payload
OMG: POP_CALC
Version 1.0
OS: Windows and Linux
Author: Kalani

Requirements: Any O.MG device running v2.5 firmware or greater.

Description: On execution, this payload will cause the target
computer to launch the Calculator. This is tested working on
Windows 2000 - Windows 11, and multiple Linux distributions
running KDE or Qt derivative Desktop Environments. It may run
elsewhere, but has not been tested.
2022-03-31 22:22:24 -04:00
TW-D 31f43e1eca
Add "Microsoft Windows" SMB Backdoor
1) Adds a user account (OMG_User:OMG_P@ssW0rD).
2) Adds this local user to local administrator group.
3) Shares "C:\" directory (OMG_SHARE).
4) Adds a rule to the firewall.
5) Sets a value to "LocalAccountTokenFilterPolicy" to access the "C:" with a local account.
6) Hides this user account.
2022-03-29 15:57:08 -04:00
Darren Kitchen 2b60598dcd
Merge pull request #21 from 0iphor13/master
Uploaded OMG-AwrenessTraining
2022-03-23 14:46:36 -05:00
0iphor13 3c47fde281
Update OMG-AwarenessTraining 2022-03-23 20:05:29 +01:00
0iphor13 244311c529
Update OMG-AwarenessTraining 2022-03-23 20:04:56 +01:00
0iphor13 3b251878b3
Create OMG-AwarenessTraining
A small payload to trigger a message box, to inform the user of the violation of the usb security policy.
The hostname will then be send to a webhook to report the incident.
2022-03-23 20:04:14 +01:00
unknown81311 291e20652d
Update payload.txt 2022-02-27 19:59:54 -07:00
OMG-MG 1d9fe45df8
Merge pull request #16 from 0iphor13/master
Uploaded FodCable - UAC Bypass
2022-02-24 13:09:41 -08:00
Drew-Sec 68bc527ceb
Update README.md 2022-02-19 01:30:43 -05:00
0iphor13 bc24d386e9
Update README.md 2022-02-16 12:07:27 +01:00
0iphor13 ec60e847eb
Uploaded FodCable - UAC Bypass
Bypass UAC and get an elevated command prompt using a modified version of the well known Fodhelper method.
2022-02-16 12:06:59 +01:00
OMG-MG 41c54164a9
Merge pull request #13 from Drew-Sec/patch-2
Patch 2
2022-02-14 14:29:06 -08:00
Marc e7a1556c8a
Merge pull request #14 from 0iphor13/master
Created ReverseCable II
2022-02-02 01:09:35 +00:00
eastoncrafter 98a2b3b882
Fixed typo
Changed REN to REM in second line
2022-02-01 11:21:17 -05:00
0iphor13 e068d02921
Created ReverseCable II
This time a udp reverse shell. Not as nice and comfortable as a tcp shell, but shell is shell <3
Do some mischief!
2022-02-01 12:08:57 +01:00
Drew-Sec 6bc2c91bb0
Create README.md 2022-01-29 13:41:22 -05:00
Drew-Sec 26f87ab1a2
Create gmail_forward_script.txt 2022-01-29 13:38:10 -05:00
0iphor13 695f251de1
Update README.md 2022-01-16 16:16:30 +01:00
0iphor13 a1df39cbd8
Update README.md 2022-01-16 16:16:20 +01:00
0iphor13 24aa976bec
Update README.md 2022-01-16 16:13:58 +01:00
0iphor13 f7c51f1fa7
Created RemoteDeskCable
Screen access to push your O.MG Cables power!
2022-01-16 16:09:09 +01:00
OMG-MG c3e19b136a Merge branch 'master' of https://github.com/hak5/omg-payloads 2022-01-13 19:49:09 -08:00
OMG-MG 40acfa084e Alt payload approaches 2022-01-13 19:48:48 -08:00
OMG-MG 2f5e77063f
Create README.md 2022-01-13 19:47:10 -08:00
OMG-MG 9c07cfff74 organizing 2022-01-13 19:26:02 -08:00
OMG-MG 54fef53fb3
Merge pull request #11 from int0x80/android-meterpreter
Android Meterpreter
2022-01-13 19:22:45 -08:00
int0x80 224587b4a5 Android Meterpreter 2022-01-13 21:09:38 -06:00
Drew-Sec 79566dc524
Create Install_Reverse_Shell_APK 2022-01-09 16:17:37 -05:00
OMG-MG a5d9471c59
Merge pull request #2 from poundplay/patch-1
wifigrabber
2022-01-04 15:36:32 -08:00
OMG-MG 5550c5c39a
Merge pull request #9 from 0iphor13/master
Uploaded ReverseCable
2022-01-04 15:35:42 -08:00
OMG-MG af082c49aa
Merge pull request #8 from keldnorman/patch-7
speaking cable
2022-01-04 15:34:45 -08:00
0iphor13 3e50541f78
Updated Discription 2021-12-28 19:19:13 +01:00
0iphor13 33e39faafa
Uploaded ReverseCable
Reverse shell, based on the ReverseDuckyII script.
Plug in your reverse shell <3
2021-12-27 16:02:27 +01:00
Keld Norman 80f8d8e2e5
Create payload.txt 2021-10-18 22:05:28 +02:00
Keld Norman ab0e2be92c
Update payload.txt 2021-10-18 20:00:14 +02:00
Keld Norman 5f8a7cc4f8
Update payload.txt 2021-10-18 19:24:37 +02:00
Keld Norman 59c830c832
Create payload.txt 2021-10-18 18:37:23 +02:00
OMG-MG 9328e12697
Merge pull request #3 from Hug1n/patch-1
Create payload.txt
2021-10-16 21:29:13 -07:00
OMG-MG 9ba67a450f
Merge pull request #6 from keldnorman/patch-2
Added DUCKY_LANG US
2021-10-16 21:27:42 -07:00
OMG-MG 85f8f0c5db
Merge pull request #5 from keldnorman/patch-4
Create README.txt
2021-10-16 21:27:35 -07:00
Keld Norman 0d114093ae
Update payload.txt 2021-10-17 01:30:09 +02:00
Keld Norman 30b01c19c3
Create README.txt
Readme to Payload that will exfiltrate wifi names + passwords from a Windows 10 PC via DNS with encrypted data
2021-10-17 01:12:48 +02:00
Keld Norman f6c3ebe078
Create payload.txt
Payload that will exfiltrate wifi names + passwords from a Windows 10 PC via DNS with encrypted data
2021-10-17 01:10:58 +02:00
Keld Norman 17d1603e85
Added DUCKY_LANG US
Added DUCKY_LANG US so people can change language by just replacing US with DE, DK etc..
2021-10-17 01:04:50 +02:00
Hug1nN_ 0d4852700b
Updated the payload
Hey! I updated the payload with the suggestions, optimized the code and used the ALT SPACE DOWN to minimize  (The ALT SPACE M didnt work here in my Windows 10 machine, but this way works very well).
2021-10-14 13:59:23 -03:00
Hug1nN_ 9120061d11
Create payload.txt
This scripts creates a reverse shell in memory, bypassing most of the antivirus out there.
2021-10-13 21:28:15 -03:00
Dante Sparda b89c452d57
wifigrabber 2021-10-12 13:03:09 -04:00
MG b8278f2c87 Delete placeholder 2021-10-12 09:13:13 -07:00
OMG-MG 2f030f58c2
Rename payloads/library/exfiltration/WiFi2DNS.txt to payloads/library/exfiltration/WiFi2DNS/WiFi2DNS.txt 2021-10-12 09:10:55 -07:00
MG 3d3eaca89c Creating directory 2021-10-12 09:10:02 -07:00
MG 55b86a5716 Revert "Creating directory for payload"
This reverts commit b15a993cd1.
2021-10-12 09:06:02 -07:00
MG b15a993cd1 Creating directory for payload 2021-10-12 09:04:36 -07:00
Keld Norman b5448cc7fe
Add p to ping.. doh
Add p to ping (it was missing)
2021-10-11 22:49:34 +02:00
Keld Norman c80510be44
First release
Code to run via OMG cable to extract all saved WiFi names + their WPA code via DNS
NB: This only works for WiFi names without space in them.
2021-10-11 22:28:36 +02:00
Marc 39dd806d84
misc: Move libray into payloads directory 2021-09-08 22:07:18 +01:00