Commit Graph

111 Commits (cb64802ff56f694379a6e6a0a98b9c8bca5e3a23)

Author SHA1 Message Date
BuffBaby253 cb64802ff5
Update payload.sh
added variable
2024-09-16 12:25:56 -07:00
BuffBaby253 26040becb0
Create payload.sh 2024-09-15 08:43:02 -07:00
BuffBaby253 4c5fdf62a1
Delete payloads/library/Wireshark PCAP Capture directory 2024-09-15 08:36:23 -07:00
BuffBaby253 4d3431c2e4
Add files via upload 2024-01-11 21:27:04 -08:00
Darren Kitchen 6875cfa09e
Merge pull request #59 from drapl0n/master
adding SERIAL_WRITE
2022-06-22 14:36:02 -05:00
drapl0n 2387b783c1
adding SERIAL_WRITE 2022-06-17 19:09:01 +05:30
Darren Kitchen 0044512a6c
Merge pull request #58 from drapl0n/patch-1
uploaded SharkDOS
2022-06-09 12:45:54 -05:00
drapl0n 7b8f934388
uploading DOS payload 2022-06-07 21:22:18 +05:30
drapl0n 6b067babf7
uploaded SharkDOS 2022-06-07 21:20:10 +05:30
Darren Kitchen 580f963ef0
Merge pull request #55 from gbaudoin/patch-1
Updated link doc in readme.md
2022-05-09 14:54:26 -05:00
Darren Kitchen 78b9315ce9
Merge pull request #54 from Unit981/patch-1
Create payload.sh
2022-05-09 14:48:51 -05:00
Guillaume Baudoin cab58abe2b
Updated link doc in readme.md
The documentation has moved.
2022-05-06 11:00:05 +02:00
Unit98.1 1ad2dbedd6
Rename payload.txt to payload.sh 2022-05-04 06:19:12 +08:00
Unit98.1 172ba18baf
Create payload.txt 2022-05-04 06:16:12 +08:00
Darren Kitchen afecd52d27
Update payload.sh
Updated with SERIAL_WRITE for Shark Jack Cable
2022-04-20 11:52:09 -05:00
Darren Kitchen 27eb6353e4
Merge pull request #43 from TW-D/patch-1
Add On-Site Implant
2022-01-21 19:09:20 -06:00
Jules Bozouklian b3cf17c1f7
add tcpdump example + exfiltration via email (#52)
* add tcpdump example + exfiltration via email

* update for PR
2022-01-19 23:40:11 +00:00
Darren Kitchen e36ef11824
Merge pull request #51 from julesbozouklian/master
add exfiltration payload work with ms teams
2022-01-19 13:23:48 -06:00
Darren Kitchen 7114f3a702
Rename payloads/library/example/ms-teams-exfiltration/payload.sh to payloads/library/exfiltration/ms-teams-exfiltration/payload.sh 2022-01-19 13:21:51 -06:00
Darren Kitchen b7048f1da6
Rename payloads/library/example/ms-teams-exfiltration/README.md to payloads/library/exfiltration/ms-teams-exfiltration/README.md 2022-01-19 13:20:34 -06:00
jboz 842dfa90cd add exfiltration payload work with ms teams 2022-01-19 19:46:23 +01:00
Random is Resistance 2b04952cb6
Added -oA option for interessting host scan again, exfil for multiple scan results (#50)
* move -oA option to standart nmap scan

moving -oA option to generate files to the scan of the whole network, not just the interessting hosts. Since e.g. .xml files are more useful for discovery scans of a whole network.

* fix

fixed borken funktion

* Update payload.sh

* adding support for multiple nmaps with -oA option 

Re-added the -oA option for interessting hosts. With differing file name.

Support for multiple nmap scans producing output files via -oA option.
2021-12-14 23:11:30 +00:00
Random is Resistance 245b54384d
Moving -oA option to standard scan (#49)
* move -oA option to standart nmap scan

moving -oA option to generate files to the scan of the whole network, not just the interessting hosts. Since e.g. .xml files are more useful for discovery scans of a whole network.

* fix

fixed borken funktion
2021-12-14 00:19:51 +00:00
Random is Resistance b4340761ba
Adding nmaps -oA option to interessting hosts scan (#48)
Adding the -oA option of nmap to export results in useful formats and upload them to the C2 Cloud. For further use in a pentest.
2021-12-14 00:19:37 +00:00
cyb3rwr3ck 5e6bbc86d3
Fixing subnet confusion (#44)
Co-authored-by: fbu <fbuedenhoelzer@it-sec.de>
2021-09-24 17:19:21 +01:00
Darren Kitchen 6325b1c381
Update README.md 2021-09-09 16:32:20 -05:00
TW-D fec6c6a636
Add On-Site Implant
Uses a "Meterpreter Payload" for remote access via a reverse HTTP.
2021-09-09 15:07:10 -04:00
Darren Kitchen e768c62a84
Updated payload for SJC 2021-08-24 08:43:21 -05:00
monsieurmarc 1302d2cda7
Resubmitting for Payload Awards (#42)
* Payload based on example nmap payload but with pastebin ex-filtration

* Update payload.sh

* refine directory name to remove spaces

refine directory name to remove spaces
2021-07-06 20:00:27 +01:00
Darren Kitchen de14bb72f6
Merge pull request #38 from idarlund/patch-1
curl command fix
2021-01-14 13:21:15 -08:00
Idar Lund 7bd42f59ee
curl command fix 2021-01-14 22:15:06 +01:00
felinuxing 1c2f18313d
Create payload.sh (#36)
Telegram Bot + SharkJack
2020-09-14 12:40:47 +03:00
Darren Kitchen 9c5e003172
Merge pull request #30 from rcoemans/patch-10
Update readme.md
2020-08-21 16:28:51 -07:00
Darren Kitchen efb8c43eb7
Merge pull request #31 from rcoemans/patch-11
Update readme.md
2020-08-21 16:28:41 -07:00
rcoemans 4e0850951a
Update readme.md
Added revision history table
2020-08-21 23:20:22 +02:00
rcoemans beb6ea4ece
Update readme.md
Added revision history table and updated document to script version 1.1
2020-08-21 23:18:35 +02:00
Darren Kitchen 73013b1c83
Merge pull request #29 from rcoemans/patch-9
Update restore.sh
2020-08-21 10:41:06 -07:00
Darren Kitchen 8488e7594f
Merge pull request #27 from rcoemans/patch-7
Update payload.sh
2020-08-21 10:40:54 -07:00
Darren Kitchen f7a8e70fcc
Merge pull request #25 from rcoemans/patch-5
Update readme.md
2020-08-21 10:40:44 -07:00
Darren Kitchen 8891bee930
Merge pull request #24 from rcoemans/patch-4
Update readme.md
2020-08-21 10:40:32 -07:00
rcoemans 6885244529
Update restore.sh
Improved CHECK_INPUT_PARAM function a bit.
2020-08-21 15:23:24 +02:00
rcoemans 83dc8ea2c0
Update payload.sh
Added Stealth Mode and fixed LLDP attack function.
2020-08-21 15:05:56 +02:00
rcoemans 9959071f00
Update readme.md
Fixed some typo's and added Hak5 Forum Thread url.
2020-08-21 09:39:06 +02:00
rcoemans 9fc6ec944b
Update readme.md
Fixed some typo's and added Hak5 Forum Thread url.
2020-08-21 09:36:02 +02:00
Darren Kitchen 8633b49886
Merge pull request #21 from rcoemans/master 2020-08-20 15:08:48 -07:00
rcoemans bc3ac45363
Merge pull request #2 from rcoemans/rcoemans-patch-2
Network Recon framework payload with logging notification and exfiltr…
2020-08-20 21:30:28 +02:00
rcoemans 0e190ca030
Network Recon framework payload with logging notification and exfiltration
Swiss knife network reconnaissance payload with options for SSH server, Cloud C2 exfiltration and led blinking for IP address, payload is based on various sample payloads from HAK5, MonsieurMarc, Topknot and others. This payload script has been organized in a way it is easy to be extended with additional recon (attack) functions.

The script has been created in a modular fashion which allows easy extending the script with new functions (e.g. recon, notification or exfiltration functions). The script furthermore incorporates logic to determine already existing loot folders and create a new (unique) loot folder every time the script is executed.
2020-08-20 21:30:12 +02:00
rcoemans 08b8ae41b8
Merge pull request #1 from rcoemans/rcoemans-patch-1
Backup and Restore scripts with logging and notification
2020-08-20 21:28:25 +02:00
rcoemans ed82e9fad2
Backup and Restore scripts with logging and notification
Being tired of having to re-image your Shark Jack and going through the hassle of backing up and restoring the device? These shell scripts will help you to backup and restore all important data on your Shark Jack.

The scripts has been created in a modular fashion which allows easy extending the scripts with new functions. The backup script (`backup.sh`) incorporates logic to determine already existing backup folders and create a new (unique) backup folder every time the script is executed.
2020-08-20 21:27:44 +02:00
Darren Kitchen 205b13abb4
Update payload.sh 2020-07-14 08:48:38 -07:00