Commit Graph

1363 Commits (4a6e17773dbf4d89a1392b292842e7292fb6827b)

Author SHA1 Message Date
Marc 116ed971ec
Merge pull request #8 from 0iphor13/master
ReverseDucky
2021-07-21 01:16:22 +01:00
Marc ee2372dc4c
Merge pull request #9 from jessiecrimsonhart/patch-1
Canary Duck
2021-07-21 01:15:25 +01:00
Jessie Crimson Hart 9604873d01
Create payload.txt
version 1.0
2021-07-17 14:42:58 -07:00
0iphor13 f15faa5414
Update ReverseDucky.txt 2021-07-17 21:32:15 +02:00
0iphor13 ff6d8c94b4
Update ReverseDucky.txt 2021-07-17 21:19:13 +02:00
0iphor13 389a11d5ad
ReverseDucky
An obfuscated reverse shell, executed directly in powershell, hidden in the background.
2021-07-17 21:15:35 +02:00
Jonny Banana 5d0eeeaa52
Create payload.txt
A quickly Rubber Ducky HTML Fork Bomb Attack.
2021-07-15 02:47:25 +02:00
Jonny Banana 31bdc108fe
Create payload.txt
A Simple Script for Rubber Ducky which Exploits Windows $MFT Vulnerability.
$MFT is used by NTFS systems to manage some metadata. Works on windows 7, 8 and vista, dont work on windows 10. I think work on Xp and earlier. The system crash lasts until the machine is switched off, or until the blue screen of death appears
2021-07-15 02:46:12 +02:00
Jonny Banana 911cb5f2cf
Create payload.txt
Requirements
-none

How it works?

The script is a One-Liner and  call an html page with a css webkit filter attack inside, this webpage crash the system ... 

webpage with the exploit here: https://github.com/JonnyBanana/safari-ie-reaper.github.io
2021-07-15 02:43:54 +02:00
Jonny Banana e952d30053
Create payload.txt
A very quickly script for rubber ducky which exploits the gatherNetworkInfo.vbs file in the
C:\Windows\System32 folder to steal different information from the victim machine.
2021-07-15 02:37:27 +02:00
Marc 44b99d3ef4
Repo: Put payload categories inside of library/payloads 2021-07-14 00:17:19 +01:00
Marc 9425c45f7d
Repo: Add structure 2021-07-14 00:13:33 +01:00
Marc 2e5313e9ef
Initial Commit 2021-07-14 00:07:00 +01:00