Alessandro Greco
c11425f7fd
Update script
2024-08-30 11:04:59 +02:00
Alessandro Greco
60eb65fbbc
Update
2024-08-30 11:00:03 +02:00
Aleff
40da51da72
[+] PASSIVE_WINDOWS_DETECT
2024-08-30 10:33:40 +02:00
Peaks
be52f4d1c9
Merge pull request #475 from yeetboy0330/master
...
Add Local_WLAN_Borrower payload
2024-08-29 03:48:05 -04:00
Yeet
64a7666c12
Update payload.txt
2024-08-29 10:07:57 +10:00
Yeet
0e9ea1358b
Update README.md
...
Made the README.md worth reading
2024-08-29 10:07:34 +10:00
Peaks
ad08ba6e36
Merge pull request #474 from PlumpyTurkey/master
...
Fix “Windows Product Key Grabber” payload
2024-08-23 05:27:29 -04:00
Yeet
a1a7310d61
Added 1.ps1 file
...
this file borrows and stores the wifi passwords.
2024-08-23 10:11:24 +10:00
Yeet
04b71efc9b
Create README.md
...
added cool readme.md to describe my payload
2024-08-23 10:10:35 +10:00
Yeet
ca6490cc9a
Create payload.txt
2024-08-23 10:06:44 +10:00
Julien M
e4a7876a00
Update version badge
2024-08-22 22:17:24 +02:00
Julien M
f7d2f37def
Remove duplicate function
2024-08-22 22:16:56 +02:00
Peaks
d02b817225
Merge pull request #400 from aleff-github/patch-80
...
Exfiltrate Windows Product Key
2024-08-21 18:42:57 -04:00
Alessandro Greco
828c60acca
Adapted with DUCKY_DRIVE_LABEL
2024-08-21 07:41:47 +02:00
Peaks
404640f615
Merge pull request #427 from aleff-github/patch-83
...
Extension: SAVE FILES IN RUBBER DUCKY STORAGE
2024-08-20 17:04:28 -04:00
Alessandro Greco
9e6b405745
from - to _
2024-08-20 12:33:10 +02:00
Alessandro Greco
c895160753
from - to _
2024-08-20 12:27:36 +02:00
Peaks
5c1ec51393
Merge pull request #470 from nathansb2022/master
...
Create Kill-Explorer.txt
2024-08-17 18:28:48 -04:00
Nate
afe674fcda
Create README.md
2024-08-06 19:30:25 -05:00
Nate
a9afcc0c6d
Create Kill-Explorer.txt
...
initial commit with ducky script
2024-08-06 19:29:22 -05:00
Peaks
e1531cc317
Merge pull request #468 from nathansb2022/master
...
Create payload DNS-TXT-CommandInjection.txt
2024-08-06 17:19:17 -04:00
Peaks
d08e573962
Merge pull request #469 from thomasboegl1/master
...
Add Windows-Screenshot-Exfil payload
2024-08-06 17:14:00 -04:00
Thomas Boeglin
f0cb608d09
Add Windows-Screenshot-Exfil payload
2024-08-06 09:58:39 +02:00
Nate
f2896f0b6f
Update DNS-TXT-CommandInjection.txt
...
Added PASSIVE_WINDOWS_DETECT EXTENSION per requested changes in pull request.
2024-08-05 14:21:46 -05:00
Nate
8eba7c5e9b
Delete payloads/library/execution/Kill-Explorer directory
2024-08-04 20:13:49 -05:00
Nate
5928326db7
Update README.md
2024-08-04 20:08:11 -05:00
Nate
42d2d6e9d5
Create Kill-Explorer.txt
2024-08-04 20:07:36 -05:00
Nate
97ae3a7339
Create README.md
2024-08-04 20:06:35 -05:00
Nate
e1c39bd455
Create DNS-TXT-CommandInjection.txt
...
Made changes requested from pull request. 1. Please remove this file as it is not needed. - removed .gitignore
2. I would recommend using a REM_BLOCK - added REM_BLOCK
3. I would include all of this in your readme.md it should contain all of this information. Having it in the payload clutters up the actually payload content. - Removed the clutter
4. If your target machine is windows you can use the PASSIVE_WINDOWS_DETECT extension. This extension will dynamically determine start delay and also ensure that the payload is ran on the correct OS. - added EXTENSION PASSIVE_WINDOWS_DETECT and updated the extension to new version. Ended up with the payload not executing.So, removed extension added in delay.
5. I would recommend using STRINGLN - added STRINGLN
6. also make sure to have a # before your DEFINE calls. #MY_TARGET_URL - added the # to MY_TARGET_URL
7. Why is this ps1 included? - removed ConvertBase64.ps1
8. Why is this file included? this is just a .txt of the powershellReverseShellOne-liner.ps1 file you uploaded. - removed T1.txt
2024-08-04 18:08:21 -05:00
Nate
f43a37e607
Create powershellReverseShellOne-liner.ps1
...
updated comments
2024-08-04 18:04:18 -05:00
Nate
5ff699caa2
Update README.md
...
fixed formatting
2024-08-04 18:01:43 -05:00
Nate
ae0d976dce
Update README.md
...
fixed formatting
2024-08-04 18:01:10 -05:00
Nate
7658b87ce0
Update README.md
...
fixed readme formatting
2024-08-04 18:00:29 -05:00
Nate
abd0a09360
Create README.md
...
Updated to reflect requested changes from pull request.
2024-08-04 17:58:09 -05:00
Nate
c8e0ac280b
Delete payloads/library/execution/DNS-TXT-CommandInjection directory
...
deleting and removing files from requested changes in Pull request
2024-08-04 14:29:33 -05:00
Nate
1fd0843049
Delete payloads/library/execution/DNS-TXT-CommandInection directory
...
misspelled injection, deleting the directory, all content has been moved to DNS-TXT-CommandInjection direcotory
2024-08-04 10:46:16 -05:00
Nate
7c989706cc
Update DNS-TXT-CommandInjection.txt
...
updated folder, misspelled injection and update link to ConvertBase64.ps1
2024-08-04 10:41:20 -05:00
Nate
c1608976d9
Update README.md
...
updated folder, misspelled injection and updated link to ConvertBase64.ps1
2024-08-04 10:38:54 -05:00
Nate
072a5dbc8a
Create ConvertBase64.ps1
...
updated folder, misspelled injection
2024-08-04 10:37:16 -05:00
Nate
cea9eb46ef
Create powershellReverseShellOne-liner.ps1
...
updated folder, misspelled commandInjection
2024-08-04 10:35:42 -05:00
Nate
e985ed3a61
Create T1.txt
...
updated folder, misspelled injection
2024-08-04 10:34:32 -05:00
Nate
3b8a1d9ec5
Create README.md
...
updating to new folder, misspelled injection
2024-08-04 10:33:19 -05:00
Nate
c832c1868c
Create DNS-TXT-CommandInjection.txt
...
misspelled Injection in file name
2024-08-04 10:31:39 -05:00
Nate
867b15eb6d
Create .gitignore
...
misspelled folder
2024-08-04 10:29:45 -05:00
Nate
054f81e077
Update DNS-TXT-CommandInection.txt
...
misspelled injection
2024-08-04 10:24:30 -05:00
Nate
e4cbee78f1
Update README.md
...
misspelled injection
2024-08-04 10:23:43 -05:00
Nate
2782d874c9
Update README.md
2024-08-03 23:50:18 -05:00
Nate
ada8bf9ea7
Update DNS-TXT-CommandInection.txt
2024-08-03 23:47:09 -05:00
Nate
13355e8519
Update README.md
2024-08-03 23:43:50 -05:00
Nate
fc745db314
Update README.md
2024-08-03 23:40:57 -05:00