nejc26
cab0e1942c
Delete sourceCode.txt
...
The correct "sourceCode.txt" is in DevilsCupid folder.
This was a duplicate.
2023-02-28 14:08:12 +01:00
0iphor13
a1ee63bf93
Update README.md
2023-02-28 13:42:24 +01:00
0iphor13
9329c28819
Update README.md
2023-02-28 13:39:59 +01:00
0iphor13
1547d558ca
Uploaded ReverseDuckyUltimate
2023-02-28 13:39:29 +01:00
nejc26
af3b9f6e89
Added README, Added files to folder
...
Added README
Added DevilsCupid files from "credentials" to the DevilsCupid folder.
2023-02-28 12:34:54 +01:00
Dallas Winger
6f70fd1335
Merge pull request #235 from nejcpirecnik/master
...
Devil's Cupid 1.0
2023-02-28 06:23:05 -05:00
nejc26
0c02bb7e86
Updated DEFINE to include example.com
2023-02-28 11:39:38 +01:00
nejc26
3624ef0a61
Update sourceCode.txt
...
Used DEFINE
2023-02-27 12:26:06 +01:00
Dallas Winger
fa33aec6df
Merge pull request #227 from 0iphor13/master
...
Created Extension: Rolling_Powershell_Execution
2023-02-27 04:24:10 -05:00
Dallas Winger
f9b84435c5
Merge pull request #237 from Who-Is-Julien/master
...
Added payload "Windows Product Duckey"
2023-02-27 04:23:50 -05:00
Dallas Winger
1b8ddc8599
Merge pull request #236 from cribb-it/MorseCode
...
New Payload - Morse Code
2023-02-27 04:16:16 -05:00
Julien Morice
3378957961
added payload Windows Product Duckey
2023-02-24 18:15:17 +01:00
Julien Morice
05f5b9c401
added README.md
2023-02-24 18:14:26 +01:00
cribb-it
d9dc3c81a5
New Payload - Morse Code
2023-02-24 15:25:57 +00:00
nejc26
da5e96bd91
Update sourceCode.txt
2023-02-24 14:55:47 +01:00
nejc26
6cb390e454
Update sourceCode.txt
2023-02-24 14:54:26 +01:00
nejc26
4351024923
Devil's Cupid
...
Trick your target into sharing their credentials through a fake authentication pop up message.
2023-02-24 14:40:19 +01:00
0iphor13
939e63bb11
Update Rolling_Powershell_Execution
...
Updated formatting so extension can be properly collapsed
2023-02-24 12:13:00 +01:00
0iphor13
7c809ca7c0
Merge branch 'hak5:master' into master
2023-02-24 12:11:50 +01:00
Dallas Winger
dae7a2f577
Merge pull request #229 from zoeruda/master
...
Add payload
2023-02-23 16:28:28 -05:00
Dallas Winger
0277ca37e0
Merge pull request #232 from cribb-it/DuckSong
...
New Payload - Hey! Got Any Grapes?
2023-02-23 16:23:04 -05:00
Dallas Winger
ca3de28382
Merge pull request #233 from whitedevil-tmp/master
...
small error fix
2023-02-23 16:21:10 -05:00
whitedevil-tmp
6077adab28
small error fix
2023-02-23 19:46:42 +05:30
cribb-it
b127e3c455
Update - Grammer
2023-02-22 17:45:00 +00:00
cribb-it
b872da601e
New Payload - Hey!, Got Any Grapes?
2023-02-22 17:30:55 +00:00
zoeruda
9077530310
Merge branch 'hak5:master' into master
2023-02-21 11:53:06 -05:00
Zoe Ronen
7f9d80eed3
fix variable call
2023-02-19 03:39:28 -05:00
zoeruda
163870dda3
add definition
...
use DEFINE instead of forcing user to randomly find and replace an arbitrary string.
2023-02-17 14:51:02 -05:00
zoeruda
f6ef9626c3
specify target
2023-02-17 14:18:47 -05:00
zoeruda
7da6d8ea41
fix
2023-02-17 12:17:55 -05:00
0iphor13
b963bb6403
Created Extension: Rolling_Powershell_Execution
...
Start Powershell in different ways through obfuscation, uncommon start paramters and randomisation.
This extension may help to evade basic and bad detection methods of starting powershell.
2023-02-17 12:58:11 +01:00
Dallas Winger
5bb2aeb90f
Merge pull request #223 from HackingMark/master
...
New Payload added
2023-02-16 13:26:17 -05:00
HackingMark
cd5b5d8ab4
Update payload.txt
2023-02-16 12:29:14 +01:00
Dallas Winger
0ed7d44321
Merge pull request #216 from Lumen-git/patch-1
...
Create PSA.txt
2023-02-16 00:10:46 -05:00
Aidan Moran
6a63b16cf0
Added example.com DEFINE statements and instructions on how to host
2023-02-15 22:23:41 -06:00
Dallas Winger
a824ba0134
fix missing ENTER(s)
2023-02-15 14:02:19 -05:00
Dallas Winger
1ff50b530e
Merge pull request #222 from hak5/deshellerator
...
Deshellerator
2023-02-13 19:07:58 -05:00
Zoe Ronen
b027af3ff6
fix typo
2023-02-12 03:43:27 -05:00
Zoe Ronen
e7cffd1cd8
add payload
2023-02-12 03:39:36 -05:00
HackingMark
dc58bff435
Add Readme
2023-02-09 15:09:02 +01:00
HackingMark
db3570d5a6
Update README.MD
2023-02-09 15:06:36 +01:00
HackingMark
6e08486383
Update README.MD
2023-02-09 15:05:57 +01:00
HackingMark
48f82ba061
Add files via upload
2023-02-09 15:04:22 +01:00
HackingMark
bef7515421
Add files via upload
2023-02-09 14:58:15 +01:00
HackingMark
58fd39e313
Media for Readme
2023-02-09 14:36:39 +01:00
HackingMark
10d7c0e7bb
New Payload added
...
This payload spawns a Hoaxshell via Villain Payload using a NGROK Tunnel.
Of course there are several ways incl encryption, its just an easy to update POC.
It helps to easy apadt the Payload to new Session Identifier which are onetime values.
2023-02-09 13:36:12 +01:00
Dallas Winger
889dc26f4d
update readme
2023-02-05 20:06:21 -05:00
Dallas Winger
e132d9335a
optimize per suggestion by Darren
2023-02-04 20:00:17 -05:00
Dallas Winger
78812cfe0b
formatting
2023-02-04 19:38:39 -05:00
Dallas Winger
4bf5333f94
initial payload commit
2023-02-04 19:36:34 -05:00