Commit Graph

51 Commits (master)

Author SHA1 Message Date
Peaks dcf527fd86
Merge pull request #65 from BuffBaby253/master
SharkNetSniffer
2024-09-17 18:02:11 -04:00
BuffBaby253 6f8d44d068
Update payload.sh 2024-09-17 12:19:41 -07:00
BuffBaby253 cb64802ff5
Update payload.sh
added variable
2024-09-16 12:25:56 -07:00
BuffBaby253 26040becb0
Create payload.sh 2024-09-15 08:43:02 -07:00
Peaks 7a0f36f069
Merge pull request #40 from InfoSecREDD/patch-1
Adding Nmap w Discord & C2 Exfil to Library
2024-07-03 20:35:11 -04:00
REDD 1f51d93b6a
Update payload.sh 2024-07-03 17:33:05 -07:00
Unit98.1 1ad2dbedd6
Rename payload.txt to payload.sh 2022-05-04 06:19:12 +08:00
Unit98.1 172ba18baf
Create payload.txt 2022-05-04 06:16:12 +08:00
Darren Kitchen afecd52d27
Update payload.sh
Updated with SERIAL_WRITE for Shark Jack Cable
2022-04-20 11:52:09 -05:00
Jules Bozouklian b3cf17c1f7
add tcpdump example + exfiltration via email (#52)
* add tcpdump example + exfiltration via email

* update for PR
2022-01-19 23:40:11 +00:00
Random is Resistance 2b04952cb6
Added -oA option for interessting host scan again, exfil for multiple scan results (#50)
* move -oA option to standart nmap scan

moving -oA option to generate files to the scan of the whole network, not just the interessting hosts. Since e.g. .xml files are more useful for discovery scans of a whole network.

* fix

fixed borken funktion

* Update payload.sh

* adding support for multiple nmaps with -oA option 

Re-added the -oA option for interessting hosts. With differing file name.

Support for multiple nmap scans producing output files via -oA option.
2021-12-14 23:11:30 +00:00
Random is Resistance 245b54384d
Moving -oA option to standard scan (#49)
* move -oA option to standart nmap scan

moving -oA option to generate files to the scan of the whole network, not just the interessting hosts. Since e.g. .xml files are more useful for discovery scans of a whole network.

* fix

fixed borken funktion
2021-12-14 00:19:51 +00:00
Random is Resistance b4340761ba
Adding nmaps -oA option to interessting hosts scan (#48)
Adding the -oA option of nmap to export results in useful formats and upload them to the C2 Cloud. For further use in a pentest.
2021-12-14 00:19:37 +00:00
cyb3rwr3ck 5e6bbc86d3
Fixing subnet confusion (#44)
Co-authored-by: fbu <fbuedenhoelzer@it-sec.de>
2021-09-24 17:19:21 +01:00
Darren Kitchen e768c62a84
Updated payload for SJC 2021-08-24 08:43:21 -05:00
monsieurmarc 1302d2cda7
Resubmitting for Payload Awards (#42)
* Payload based on example nmap payload but with pastebin ex-filtration

* Update payload.sh

* refine directory name to remove spaces

refine directory name to remove spaces
2021-07-06 20:00:27 +01:00
ar1k88 26047aa6fe
Update payload.sh 2021-01-22 04:25:13 -08:00
ar1k88 27a98cb46e
Create payload.sh 2021-01-22 02:41:35 -08:00
Idar Lund 7bd42f59ee
curl command fix 2021-01-14 22:15:06 +01:00
felinuxing 1c2f18313d
Create payload.sh (#36)
Telegram Bot + SharkJack
2020-09-14 12:40:47 +03:00
rcoemans beb6ea4ece
Update readme.md
Added revision history table and updated document to script version 1.1
2020-08-21 23:18:35 +02:00
Darren Kitchen 8488e7594f
Merge pull request #27 from rcoemans/patch-7
Update payload.sh
2020-08-21 10:40:54 -07:00
rcoemans 83dc8ea2c0
Update payload.sh
Added Stealth Mode and fixed LLDP attack function.
2020-08-21 15:05:56 +02:00
rcoemans 9959071f00
Update readme.md
Fixed some typo's and added Hak5 Forum Thread url.
2020-08-21 09:39:06 +02:00
rcoemans 0e190ca030
Network Recon framework payload with logging notification and exfiltration
Swiss knife network reconnaissance payload with options for SSH server, Cloud C2 exfiltration and led blinking for IP address, payload is based on various sample payloads from HAK5, MonsieurMarc, Topknot and others. This payload script has been organized in a way it is easy to be extended with additional recon (attack) functions.

The script has been created in a modular fashion which allows easy extending the script with new functions (e.g. recon, notification or exfiltration functions). The script furthermore incorporates logic to determine already existing loot folders and create a new (unique) loot folder every time the script is executed.
2020-08-20 21:30:12 +02:00
Darren Kitchen 205b13abb4
Update payload.sh 2020-07-14 08:48:38 -07:00
Darren Kitchen ac62eca388
Update payload.sh 2020-05-25 12:55:31 -07:00
deviant 1698a082c3
Update payload.sh 2020-05-20 19:33:41 -07:00
deviant d8be685b59
Add files via upload 2020-05-20 18:16:04 -07:00
Darren Kitchen 59817daf53
Merge pull request #12 from private-locker/master
Adding Nmap-C2 to Payloads Repo.
2020-01-16 13:26:05 -08:00
Darren Kitchen 6d3a199536
Merge pull request #13 from woundride/master
netdiscover-passive-payload
2019-12-22 11:13:48 -08:00
woundride 7d9abd3f2a
netdiscover-passive-payload 2019-12-19 08:49:53 +00:00
Darren Kitchen 85e84ed7ec
Merge pull request #10 from chill633/chill633-patch-1
Update payload.sh
2019-12-18 19:48:01 -08:00
Private-Locker, LLC af715af898
Adding small fixes to payload. 2019-12-17 16:57:43 -08:00
Private-Locker, LLC bbf6c58837
Update payload.sh 2019-12-17 16:52:48 -08:00
Private-Locker, LLC 8ac19ac4f6
Adding Nmap-C2 to Payloads folder for Hak5
No credit needed. Added C2 Exfiltration of all files in the Nmap $LOOT_DIR. - Could be cleaner.
2019-12-17 16:29:44 -08:00
Private-Locker, LLC 5b26382058
Delete Nmap-C2 2019-12-17 16:28:29 -08:00
Private-Locker, LLC 677cc2b0a8
Create Nmap-C2 2019-12-17 16:28:16 -08:00
woundride 1c0f3875b2
Create payload.sh 2019-12-06 22:58:43 +00:00
chill633 3548b819bf
Update payload.sh 2019-12-05 14:28:38 -05:00
chill633 42325c5d61
Update payload.sh 2019-12-04 19:08:00 -05:00
Darren Kitchen a74bf50f98
Added NETMODE for firmware 1.1.0 compatibility 2019-11-08 17:52:31 -08:00
Darren Kitchen 0596d65a94
Updated payload with NETMODE for firmware 1.1.0+ 2019-11-08 17:51:33 -08:00
Darren Kitchen 5486d430ad
Updated with NETMODE for firmware v1.1.0+ 2019-11-08 17:50:33 -08:00
theguy fc3e612c57 fixed ipinfo script 2019-11-07 20:43:52 +01:00
Topknot 2cdd922d56
Add files via upload 2019-11-03 21:09:28 -05:00
Marc c5042cc2d9
Ensure nmap pastebin payload uses HTTPS endpoints.
It's best practice to use HTTPS wherever possible. As the Pastebin API supports it, we'll do exactly that.
2019-10-29 20:07:27 +00:00
monsieurmarc b627a6563c Payload based on example nmap payload but with pastebin ex-filtration (#5)
* Payload based on example nmap payload but with pastebin ex-filtration

* Update payload.sh

* refine directory name to remove spaces
2019-10-29 18:14:56 +00:00
Darren Kitchen 2985e1e0e0
Added ipinfo payload 2019-10-24 09:58:46 -07:00
Dallas Winger 46baa89c4d
Sample nmap payload 2019-08-22 14:45:21 -04:00