Commit Graph

1386 Commits (master)

Author SHA1 Message Date
Alessandro Greco c11425f7fd Update script 2024-08-30 11:04:59 +02:00
Alessandro Greco 60eb65fbbc Update 2024-08-30 11:00:03 +02:00
Aleff 40da51da72
[+] PASSIVE_WINDOWS_DETECT 2024-08-30 10:33:40 +02:00
Peaks be52f4d1c9
Merge pull request #475 from yeetboy0330/master
Add Local_WLAN_Borrower payload
2024-08-29 03:48:05 -04:00
Yeet 64a7666c12
Update payload.txt 2024-08-29 10:07:57 +10:00
Yeet 0e9ea1358b
Update README.md
Made the README.md worth reading
2024-08-29 10:07:34 +10:00
Peaks ad08ba6e36
Merge pull request #474 from PlumpyTurkey/master
Fix “Windows Product Key Grabber” payload
2024-08-23 05:27:29 -04:00
Yeet a1a7310d61
Added 1.ps1 file
this file borrows and stores the wifi passwords.
2024-08-23 10:11:24 +10:00
Yeet 04b71efc9b
Create README.md
added cool readme.md to describe my payload
2024-08-23 10:10:35 +10:00
Yeet ca6490cc9a
Create payload.txt 2024-08-23 10:06:44 +10:00
Julien M e4a7876a00 Update version badge 2024-08-22 22:17:24 +02:00
Julien M f7d2f37def Remove duplicate function 2024-08-22 22:16:56 +02:00
Peaks d02b817225
Merge pull request #400 from aleff-github/patch-80
Exfiltrate Windows Product Key
2024-08-21 18:42:57 -04:00
Alessandro Greco 828c60acca Adapted with DUCKY_DRIVE_LABEL 2024-08-21 07:41:47 +02:00
Peaks 404640f615
Merge pull request #427 from aleff-github/patch-83
Extension: SAVE FILES IN RUBBER DUCKY STORAGE
2024-08-20 17:04:28 -04:00
Alessandro Greco 9e6b405745 from - to _ 2024-08-20 12:33:10 +02:00
Alessandro Greco c895160753 from - to _ 2024-08-20 12:27:36 +02:00
Peaks 5c1ec51393
Merge pull request #470 from nathansb2022/master
Create Kill-Explorer.txt
2024-08-17 18:28:48 -04:00
Nate afe674fcda
Create README.md 2024-08-06 19:30:25 -05:00
Nate a9afcc0c6d
Create Kill-Explorer.txt
initial commit with ducky script
2024-08-06 19:29:22 -05:00
Peaks e1531cc317
Merge pull request #468 from nathansb2022/master
Create payload DNS-TXT-CommandInjection.txt
2024-08-06 17:19:17 -04:00
Peaks d08e573962
Merge pull request #469 from thomasboegl1/master
Add Windows-Screenshot-Exfil payload
2024-08-06 17:14:00 -04:00
Thomas Boeglin f0cb608d09 Add Windows-Screenshot-Exfil payload 2024-08-06 09:58:39 +02:00
Nate f2896f0b6f
Update DNS-TXT-CommandInjection.txt
Added PASSIVE_WINDOWS_DETECT EXTENSION per requested changes in pull request.
2024-08-05 14:21:46 -05:00
Nate 8eba7c5e9b
Delete payloads/library/execution/Kill-Explorer directory 2024-08-04 20:13:49 -05:00
Nate 5928326db7
Update README.md 2024-08-04 20:08:11 -05:00
Nate 42d2d6e9d5
Create Kill-Explorer.txt 2024-08-04 20:07:36 -05:00
Nate 97ae3a7339
Create README.md 2024-08-04 20:06:35 -05:00
Nate e1c39bd455
Create DNS-TXT-CommandInjection.txt
Made changes requested from pull request. 1. Please remove this file as it is not needed. - removed .gitignore
2. I would recommend using a REM_BLOCK - added REM_BLOCK
3. I would include all of this in your readme.md it should contain all of this information. Having it in the payload clutters up the actually payload content. - Removed the clutter
4. If your target machine is windows you can use the PASSIVE_WINDOWS_DETECT extension. This extension will dynamically determine start delay and also ensure that the payload is ran on the correct OS. - added EXTENSION PASSIVE_WINDOWS_DETECT and updated the extension to new version. Ended up with the payload not executing.So, removed extension added in delay.
5. I would recommend using STRINGLN - added STRINGLN
6. also make sure to have a # before your DEFINE calls. #MY_TARGET_URL - added the # to MY_TARGET_URL
7. Why is this ps1 included? - removed ConvertBase64.ps1
8. Why is this file included? this is just a .txt of the powershellReverseShellOne-liner.ps1 file you uploaded. - removed T1.txt
2024-08-04 18:08:21 -05:00
Nate f43a37e607
Create powershellReverseShellOne-liner.ps1
updated comments
2024-08-04 18:04:18 -05:00
Nate 5ff699caa2
Update README.md
fixed formatting
2024-08-04 18:01:43 -05:00
Nate ae0d976dce
Update README.md
fixed formatting
2024-08-04 18:01:10 -05:00
Nate 7658b87ce0
Update README.md
fixed readme formatting
2024-08-04 18:00:29 -05:00
Nate abd0a09360
Create README.md
Updated to reflect requested changes from pull request.
2024-08-04 17:58:09 -05:00
Nate c8e0ac280b
Delete payloads/library/execution/DNS-TXT-CommandInjection directory
deleting and removing files from requested changes in Pull request
2024-08-04 14:29:33 -05:00
Nate 1fd0843049
Delete payloads/library/execution/DNS-TXT-CommandInection directory
misspelled injection, deleting the directory, all content has been moved to DNS-TXT-CommandInjection direcotory
2024-08-04 10:46:16 -05:00
Nate 7c989706cc
Update DNS-TXT-CommandInjection.txt
updated folder, misspelled injection and update link to ConvertBase64.ps1
2024-08-04 10:41:20 -05:00
Nate c1608976d9
Update README.md
updated folder, misspelled injection and updated link to ConvertBase64.ps1
2024-08-04 10:38:54 -05:00
Nate 072a5dbc8a
Create ConvertBase64.ps1
updated folder, misspelled injection
2024-08-04 10:37:16 -05:00
Nate cea9eb46ef
Create powershellReverseShellOne-liner.ps1
updated folder, misspelled commandInjection
2024-08-04 10:35:42 -05:00
Nate e985ed3a61
Create T1.txt
updated folder, misspelled injection
2024-08-04 10:34:32 -05:00
Nate 3b8a1d9ec5
Create README.md
updating to new folder, misspelled injection
2024-08-04 10:33:19 -05:00
Nate c832c1868c
Create DNS-TXT-CommandInjection.txt
misspelled Injection in file name
2024-08-04 10:31:39 -05:00
Nate 867b15eb6d
Create .gitignore
misspelled folder
2024-08-04 10:29:45 -05:00
Nate 054f81e077
Update DNS-TXT-CommandInection.txt
misspelled injection
2024-08-04 10:24:30 -05:00
Nate e4cbee78f1
Update README.md
misspelled injection
2024-08-04 10:23:43 -05:00
Nate 2782d874c9
Update README.md 2024-08-03 23:50:18 -05:00
Nate ada8bf9ea7
Update DNS-TXT-CommandInection.txt 2024-08-03 23:47:09 -05:00
Nate 13355e8519
Update README.md 2024-08-03 23:43:50 -05:00
Nate fc745db314
Update README.md 2024-08-03 23:40:57 -05:00