Commit Graph

896 Commits (777d28a254a7b08a992ec8062c5b6bd752a25404)

Author SHA1 Message Date
nejc26 cab0e1942c
Delete sourceCode.txt
The correct "sourceCode.txt" is in DevilsCupid folder. 
This was a duplicate.
2023-02-28 14:08:12 +01:00
0iphor13 a1ee63bf93
Update README.md 2023-02-28 13:42:24 +01:00
0iphor13 9329c28819
Update README.md 2023-02-28 13:39:59 +01:00
0iphor13 1547d558ca
Uploaded ReverseDuckyUltimate 2023-02-28 13:39:29 +01:00
nejc26 af3b9f6e89 Added README, Added files to folder
Added README
Added DevilsCupid files from "credentials" to the DevilsCupid folder.
2023-02-28 12:34:54 +01:00
Dallas Winger 6f70fd1335
Merge pull request #235 from nejcpirecnik/master
Devil's Cupid 1.0
2023-02-28 06:23:05 -05:00
nejc26 0c02bb7e86
Updated DEFINE to include example.com 2023-02-28 11:39:38 +01:00
nejc26 3624ef0a61
Update sourceCode.txt
Used DEFINE
2023-02-27 12:26:06 +01:00
Dallas Winger fa33aec6df
Merge pull request #227 from 0iphor13/master
Created Extension: Rolling_Powershell_Execution
2023-02-27 04:24:10 -05:00
Dallas Winger f9b84435c5
Merge pull request #237 from Who-Is-Julien/master
Added payload "Windows Product Duckey"
2023-02-27 04:23:50 -05:00
Dallas Winger 1b8ddc8599
Merge pull request #236 from cribb-it/MorseCode
New Payload - Morse Code
2023-02-27 04:16:16 -05:00
Julien Morice 3378957961
added payload Windows Product Duckey 2023-02-24 18:15:17 +01:00
Julien Morice 05f5b9c401
added README.md 2023-02-24 18:14:26 +01:00
cribb-it d9dc3c81a5 New Payload - Morse Code 2023-02-24 15:25:57 +00:00
nejc26 da5e96bd91
Update sourceCode.txt 2023-02-24 14:55:47 +01:00
nejc26 6cb390e454
Update sourceCode.txt 2023-02-24 14:54:26 +01:00
nejc26 4351024923
Devil's Cupid
Trick your target into sharing their credentials through a fake authentication pop up message.
2023-02-24 14:40:19 +01:00
0iphor13 939e63bb11
Update Rolling_Powershell_Execution
Updated formatting so extension can be properly collapsed
2023-02-24 12:13:00 +01:00
0iphor13 7c809ca7c0
Merge branch 'hak5:master' into master 2023-02-24 12:11:50 +01:00
Dallas Winger dae7a2f577
Merge pull request #229 from zoeruda/master
Add payload
2023-02-23 16:28:28 -05:00
Dallas Winger 0277ca37e0
Merge pull request #232 from cribb-it/DuckSong
New Payload - Hey! Got Any Grapes?
2023-02-23 16:23:04 -05:00
Dallas Winger ca3de28382
Merge pull request #233 from whitedevil-tmp/master
small error fix
2023-02-23 16:21:10 -05:00
whitedevil-tmp 6077adab28
small error fix 2023-02-23 19:46:42 +05:30
cribb-it b127e3c455 Update - Grammer 2023-02-22 17:45:00 +00:00
cribb-it b872da601e New Payload - Hey!, Got Any Grapes? 2023-02-22 17:30:55 +00:00
zoeruda 9077530310
Merge branch 'hak5:master' into master 2023-02-21 11:53:06 -05:00
Zoe Ronen 7f9d80eed3 fix variable call 2023-02-19 03:39:28 -05:00
zoeruda 163870dda3
add definition
use DEFINE instead of forcing user to randomly find and replace an arbitrary string.
2023-02-17 14:51:02 -05:00
zoeruda f6ef9626c3
specify target 2023-02-17 14:18:47 -05:00
zoeruda 7da6d8ea41
fix 2023-02-17 12:17:55 -05:00
0iphor13 b963bb6403
Created Extension: Rolling_Powershell_Execution
Start Powershell in different ways through obfuscation, uncommon start paramters and randomisation.
This extension may help to evade basic and bad detection methods of starting powershell.
2023-02-17 12:58:11 +01:00
Dallas Winger 5bb2aeb90f
Merge pull request #223 from HackingMark/master
New Payload added
2023-02-16 13:26:17 -05:00
HackingMark cd5b5d8ab4
Update payload.txt 2023-02-16 12:29:14 +01:00
Dallas Winger 0ed7d44321
Merge pull request #216 from Lumen-git/patch-1
Create PSA.txt
2023-02-16 00:10:46 -05:00
Aidan Moran 6a63b16cf0
Added example.com DEFINE statements and instructions on how to host 2023-02-15 22:23:41 -06:00
Dallas Winger a824ba0134
fix missing ENTER(s) 2023-02-15 14:02:19 -05:00
Dallas Winger 1ff50b530e
Merge pull request #222 from hak5/deshellerator
Deshellerator
2023-02-13 19:07:58 -05:00
Zoe Ronen b027af3ff6 fix typo 2023-02-12 03:43:27 -05:00
Zoe Ronen e7cffd1cd8 add payload 2023-02-12 03:39:36 -05:00
HackingMark dc58bff435
Add Readme 2023-02-09 15:09:02 +01:00
HackingMark db3570d5a6
Update README.MD 2023-02-09 15:06:36 +01:00
HackingMark 6e08486383
Update README.MD 2023-02-09 15:05:57 +01:00
HackingMark 48f82ba061
Add files via upload 2023-02-09 15:04:22 +01:00
HackingMark bef7515421
Add files via upload 2023-02-09 14:58:15 +01:00
HackingMark 58fd39e313
Media for Readme 2023-02-09 14:36:39 +01:00
HackingMark 10d7c0e7bb
New Payload added
This payload spawns a Hoaxshell via Villain Payload using a NGROK Tunnel.
Of course there are several ways incl encryption, its just an easy to update POC.
It helps to easy apadt the Payload to new Session Identifier which are onetime values.
2023-02-09 13:36:12 +01:00
Dallas Winger 889dc26f4d
update readme 2023-02-05 20:06:21 -05:00
Dallas Winger e132d9335a
optimize per suggestion by Darren 2023-02-04 20:00:17 -05:00
Dallas Winger 78812cfe0b
formatting 2023-02-04 19:38:39 -05:00
Dallas Winger 4bf5333f94
initial payload commit 2023-02-04 19:36:34 -05:00