diff --git a/payloads/library/execution/Kill-Explorer/README.md b/payloads/library/execution/Kill-Explorer/README.md new file mode 100644 index 0000000..b1cd044 --- /dev/null +++ b/payloads/library/execution/Kill-Explorer/README.md @@ -0,0 +1,12 @@ +# Kill-Explorer +A ducky script that kills explorer.exe repeatedly resulting in loss of Windows Desktop functionality. The command executed is a simple Denial of Service for the intended user. +## Configuration +1. Execute on windows 10 or Windows 11. +2. Logoff or restart to reset your windows session. +## Notes +A great tool for distractions or social engineering. +## Windows Commands (used in payload) +### Execute DNS TXT Payload +```Powershell +powershell /w 1 while($true){kill -name explorer} +```