mirror of https://github.com/hak5/omg-payloads.git
dd72e4b9cc
In this DuckyScript™, we explore a method to evade Windows 11's Script Execution Policy protections. The approach involves downloading a script to RAM, then executing it in RAM on-the-fly. This can be accomplished **without** administrative rights. |
||
---|---|---|
.. | ||
credentials | ||
execution | ||
exfiltration | ||
general | ||
incident_response | ||
mobile | ||
phishing | ||
prank | ||
recon | ||
remote_access |