omg-payloads/payloads/library
salt-or-ester dd72e4b9cc
Create bypass-buddy.txt
In this DuckyScript™, we explore a method to evade Windows 11's Script Execution Policy protections.  The approach involves downloading a script to RAM, then executing it in RAM on-the-fly.  This can be accomplished **without** administrative rights.
2024-09-13 12:29:59 -07:00
..
credentials Username Change 2024-05-28 19:28:14 +02:00
execution Create bypass-buddy.txt 2024-09-13 12:29:59 -07:00
exfiltration Merge pull request #214 from aleff-github/patch-60 2024-05-24 16:17:21 -04:00
general Username Change 2024-05-28 19:28:14 +02:00
incident_response Merge pull request #212 from aleff-github/patch-58 2024-05-24 16:17:54 -04:00
mobile Add .gitignore for repo 2023-12-07 13:54:49 -05:00
phishing Update 2023-06-25 00:39:41 +02:00
prank Username Change 2024-05-28 19:28:14 +02:00
recon Add files via upload 2022-05-09 22:44:01 -05:00
remote_access Username Change 2024-05-28 19:28:14 +02:00