Commit Graph

1288 Commits (47fa68ecd9dfd302c661dfb153dba6ec2906b54f)

Author SHA1 Message Date
Darren Kitchen d0c57ed9c8 Moved ReverseDucky and ReverseDuckyII into their own directories 2021-08-27 08:20:10 -05:00
Darren Kitchen 4fedd73991 Moved DuckyHelper into its own directory and added .txt extension 2021-08-27 08:18:15 -05:00
Darren Kitchen f54998245e
Merge pull request #18 from 0iphor13/master
Deleting of unnecessary line
2021-08-27 08:15:15 -05:00
0iphor13 34d4e36393 Merge remote-tracking branch 'upstream/master' 2021-08-27 11:26:58 +02:00
0iphor13 f08f904bd2 Deleted unnecessary line
Deleted unnecessary line, which was used twice
2021-08-27 11:02:29 +02:00
0iphor13 f3c751a046
Updated ReverseDucky to v. 1.1 (#17)
* Uploaded ReverseDuckyII

ReverseDucky2 - A faster way to gain a reverse shell & easier to configure

Obfuscated Powershell code to bypass AMSI & Windows Defender.

* Update ReverseDucky to v. 1.1

Updated ReverseDucky to version 1.1 - Shorten the code (Now faster than RDII) & still evade Defender.

* Update ReverseDucky.txt

* Create DuckyHelper

UAC bypass for privilege escalation (Method FodHelper)
2021-08-26 18:17:31 +01:00
0iphor13 051ff3c554 Merge remote-tracking branch 'upstream/master' 2021-08-26 19:09:25 +02:00
0iphor13 67ddd5687b
Create DuckyHelper
UAC bypass for privilege escalation (Method FodHelper)
2021-08-26 18:09:14 +02:00
0iphor13 a7f32866d5
Update ReverseDucky.txt 2021-08-24 22:55:10 +02:00
0iphor13 55f6a0d7ff
Update ReverseDucky to v. 1.1
Updated ReverseDucky to version 1.1 - Shorten the code (Now faster than RDII) & still evade Defender.
2021-08-22 11:55:06 +02:00
Marc 2509641d36
Credentials: Fix directory name for password grabber 2021-08-17 16:49:38 +01:00
Marc c3c25360df
Merge branch 'master' of github.com:hak5/usbrubberducky-payloads 2021-08-17 16:47:46 +01:00
Marc 1416a4a9f4
Misc: Fix structure of repository 2021-08-17 16:47:32 +01:00
Darren Kitchen 50b685ac73
Merge pull request #10 from makozort/patch-1
windows password grabber
2021-08-17 10:41:38 -05:00
Darren Kitchen 625abb070c
Merge pull request #14 from Zero-Sploit/patch-1
Ducky WiFi Grabber
2021-08-17 10:39:39 -05:00
Darren Kitchen d1cccaa8ed
Ducky WiFi Grabber 2021-08-17 10:38:23 -05:00
Marc abb624b1d0
Misc: Cleanup Repository 2021-08-17 16:35:49 +01:00
Darren Kitchen edfc8ee726
Merge pull request #15 from Zero-Sploit/patch-2
Disable_Windows10_Defender
2021-08-17 10:34:44 -05:00
Zero-Sploit 511d745294
Create payload.txt 2021-08-17 05:45:26 -04:00
Zero-Sploit e83f7bdc9c
Create payload.txt 2021-08-17 05:38:41 -04:00
0iphor13 01de78b311
Uploaded ReverseDuckyII (#11)
ReverseDucky2 - A faster way to gain a reverse shell & easier to configure

Obfuscated Powershell code to bypass AMSI & Windows Defender.
2021-08-10 21:31:25 +01:00
Alex007-CyberGuy e84b1b1338
Gain knowledge from the Tree (#12)
* Useful Reconnaissance Payload 

New payload based on the potential of the "tree" command.

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Delete library/payloads/recon/Tree of Knowledge/Bonus directory

I removed the exe

* Update readme.md

* Rename library/payloads/recon/Tree of Knowledge/readme.md to library/payloads/recon/Tree_of_Knowledge/readme.md

* Rename library/payloads/recon/Tree_of_Knowledge/readme.md to library/payloads/recon/Tree of Knowledge/readme.md

* Delete library/payloads/recon/Tree of Knowledge directory

* Gain knowledge from the Tree

Grabs the names of all the files on a victim's pc and hides them from prying eyes.
2021-08-10 21:24:42 +01:00
0iphor13 59cc824b0f
Uploaded ReverseDuckyII
ReverseDucky2 - A faster way to gain a reverse shell & easier to configure

Obfuscated Powershell code to bypass AMSI & Windows Defender.
2021-08-05 10:52:17 +02:00
Jack Matthews c4d8d44e9d
Create payload.txt 2021-07-28 10:39:32 +10:00
John Fawcett 182a9a1859
Hotfix Warning (#1)
* Add files via upload

A very simple payload to just show current hotfixes and then display a message warning the victim not to trust random USB sticks.  Can change timing to possibly make quicker

* A quick payload to display hotfixes and then display a hacked message so user will not plug in strange USB sticks in the future.

* Delete ducky_script.txt
2021-07-21 01:18:53 +01:00
Marc 116ed971ec
Merge pull request #8 from 0iphor13/master
ReverseDucky
2021-07-21 01:16:22 +01:00
Marc ee2372dc4c
Merge pull request #9 from jessiecrimsonhart/patch-1
Canary Duck
2021-07-21 01:15:25 +01:00
Jessie Crimson Hart 9604873d01
Create payload.txt
version 1.0
2021-07-17 14:42:58 -07:00
0iphor13 f15faa5414
Update ReverseDucky.txt 2021-07-17 21:32:15 +02:00
0iphor13 ff6d8c94b4
Update ReverseDucky.txt 2021-07-17 21:19:13 +02:00
0iphor13 389a11d5ad
ReverseDucky
An obfuscated reverse shell, executed directly in powershell, hidden in the background.
2021-07-17 21:15:35 +02:00
Jonny Banana 5d0eeeaa52
Create payload.txt
A quickly Rubber Ducky HTML Fork Bomb Attack.
2021-07-15 02:47:25 +02:00
Jonny Banana 31bdc108fe
Create payload.txt
A Simple Script for Rubber Ducky which Exploits Windows $MFT Vulnerability.
$MFT is used by NTFS systems to manage some metadata. Works on windows 7, 8 and vista, dont work on windows 10. I think work on Xp and earlier. The system crash lasts until the machine is switched off, or until the blue screen of death appears
2021-07-15 02:46:12 +02:00
Jonny Banana 911cb5f2cf
Create payload.txt
Requirements
-none

How it works?

The script is a One-Liner and  call an html page with a css webkit filter attack inside, this webpage crash the system ... 

webpage with the exploit here: https://github.com/JonnyBanana/safari-ie-reaper.github.io
2021-07-15 02:43:54 +02:00
Jonny Banana e952d30053
Create payload.txt
A very quickly script for rubber ducky which exploits the gatherNetworkInfo.vbs file in the
C:\Windows\System32 folder to steal different information from the victim machine.
2021-07-15 02:37:27 +02:00
Marc 44b99d3ef4
Repo: Put payload categories inside of library/payloads 2021-07-14 00:17:19 +01:00
Marc 9425c45f7d
Repo: Add structure 2021-07-14 00:13:33 +01:00
Marc 2e5313e9ef
Initial Commit 2021-07-14 00:07:00 +01:00