omg-payloads/payloads/library/remote_access
Tyler c1882928ee
Create Violate-Defender
### FOR EDUCATIONAL PURPOSES ONLY ####  
This is a simple DuckyScript that has been tested on the O.MG cable. it is designed to create a rule expection to a folder usering powershell to circumvent Windows Defender. this may only work if the user/target in quesiton has elevated rights to run a cmd/powershell prompt as Administrator. the script will use the curl command and download a file from your attacker machine and place it into a  created folder of your choice while applying the execption to that folder.
2024-01-01 20:56:44 -05:00
..
OMGNet uploading OMGNet 2023-07-09 19:59:18 +05:30
PingZhellCable Update README.md 2022-07-02 12:54:54 +02:00
RemoteDeskCable Update README.md 2023-05-27 17:03:15 +02:00
ReverseCable Updated ReverseCable 2023-06-02 14:24:59 +02:00
ReverseCable II Created ReverseCable II 2022-02-01 12:08:57 +01:00
ReverseCableSSL Update README.md 2023-06-07 15:20:20 +02:00
persistentReverseOMG Uploaded persistentReverseOMG 2022-05-11 20:36:22 +05:30
revshell_macOS Update README.md 2022-07-10 23:40:30 -07:00
revshell_windows Update payload.txt 2022-02-27 19:59:54 -07:00
win_smb-backdoor Add "Microsoft Windows" SMB Backdoor 2022-03-29 15:57:08 -04:00
win_winrm-backdoor Update payload.txt 2022-08-09 03:32:25 -04:00
Violate-Defender Create Violate-Defender 2024-01-01 20:56:44 -05:00
placeholder misc: Move libray into payloads directory 2021-09-08 22:07:18 +01:00