0ff7e67533 | ||
---|---|---|
.. | ||
README.md | ||
UrAttaControl-Execute.txt |
README.md
Table of Contents
UrAttaControl
A script used to open an elevated powershell console and execute admin level commands
Description
Completely ran from the execute file. Replace the URL in that file with yours leading to a base64 script
This script will use IEX to download a base64 script to the $Payload variable
Using a keystroke injections attack a heavily obfuscated and encoded snippet will download and execute any base64
script saved in the $Payload variable
This payload completely bypasses the UAC and will run any admin level script without a prompt
You can use this function I wrote to convert your .ps1 sscripts to Base64
https://github.com/I-Am-Jakoby/PowerShell-for-Hackers/blob/main/Functions/B64.md
Getting Started
Dependencies
- DropBox or other file sharing service - Your Shared link for the intended file
- Windows 10,11
Executing program
- Plug in your device
- A keystroke injection based payload will run
Contributing
All contributors names will be listed here
I am Jakoby
Version History
- 0.1
- Initial Release
Contact
I am Jakoby
Project Link: [https://github.com/I-Am-Jakoby/hak5-submissions/tree/main/OMG/Payloads/OMG-UrAttaControl)