Commit Graph

1306 Commits (8073d4d9cd172d2dc1499293d5e1e2419b8cde1d)

Author SHA1 Message Date
mavisinator30001 8073d4d9cd
Create Resolution_Prank.txt
Added Resolution_Prank folder and related payload into said folder
2024-09-18 07:30:59 -07:00
Peaks 02641718a0
Merge pull request #478 from aleff-github/patch-91
Install Any Arbitrary VSCode Extension
2024-09-17 18:06:23 -04:00
Aleff 2c84ff499c
Update payload.txt 2024-09-17 10:23:40 +02:00
Peaks 7883e2bc50
Merge pull request #479 from aleff-github/patch-92
Install Official VSCode Extension
2024-09-17 03:11:42 -04:00
Aleff e5254c68a2
Update README.md
[+] Credits
2024-09-05 13:15:56 +02:00
Alessandro Greco d350174b13 Install Official VSCode Extension
This script automates the installation of an official Visual Studio Code extension on Windows 10/11 systems.

The extension to be installed is specified via the `publisher.extensionName` parameter.

The script uses passive operating system detection to determine if the system is running Windows, and proceeds with the extension installation accordingly.
2024-09-05 13:11:53 +02:00
Alessandro Greco 284195f4cd Install Any Arbitrary VSCode Extension
This DuckyScript script is designed to automate the installation of any arbitrary Visual Studio Code (VSCode) extension on Windows 10. It performs the following tasks:

1. Removes any pre-existing version of the extension (if applicable).
2. Downloads a ZIP archive of a VSCode extension.
3. Extracts the extension to the correct VSCode extensions folder.

The script makes use of PowerShell to manage file paths and execute commands necessary for the installation process. The user must provide the name of the extension folder and the link to the ZIP archive containing the extension.
2024-09-05 09:52:58 +02:00
Peaks 45a1dc0f01
Merge pull request #345 from aleff-github/patch-62
Follow someone on Instagram
2024-09-04 12:41:08 -04:00
Peaks 0bebb446fd
Merge pull request #476 from aleff-github/patch-88
[+] PASSIVE_WINDOWS_DETECT
2024-09-02 12:22:54 -04:00
Aleff 7749aa95c1
DOWNARROW Error 2024-09-02 09:50:42 +02:00
Peaks 9f5f323a0d
Merge pull request #349 from aleff-github/patch-66
Update READMEs Aleff Credits
2024-09-01 20:02:13 -04:00
Peaks b697112f2b
Merge pull request #355 from aleff-github/patch-69
Play A Song On An iPhone
2024-09-01 18:03:28 -04:00
Peaks d4e64b9974
Merge pull request #353 from aleff-github/patch-67
Change Github Profile Settings
2024-09-01 18:01:34 -04:00
Peaks 29ac81bb31
Merge pull request #356 from aleff-github/patch-70
Call Someone On An iPhone
2024-08-30 08:44:45 -04:00
Peaks 4e44f6ef84
Merge pull request #358 from aleff-github/patch-71
Edit A Reminder On An iPhone
2024-08-30 08:43:38 -04:00
Peaks 42a455a7a2
Merge pull request #359 from aleff-github/patch-72
Delete A Reminder On An iPhone
2024-08-30 08:42:50 -04:00
Alessandro Greco 2ed20404a3 moved to execution 2024-08-30 11:14:54 +02:00
Alessandro Greco 777d28a254 Updated 2024-08-30 11:11:41 +02:00
Alessandro Greco af77fdb130 Removed duplicate 2024-08-30 11:08:48 +02:00
Alessandro Greco 6331122f51 Update script 2024-08-30 11:06:48 +02:00
Alessandro Greco c11425f7fd Update script 2024-08-30 11:04:59 +02:00
Alessandro Greco 60eb65fbbc Update 2024-08-30 11:00:03 +02:00
Aleff 40da51da72
[+] PASSIVE_WINDOWS_DETECT 2024-08-30 10:33:40 +02:00
Peaks be52f4d1c9
Merge pull request #475 from yeetboy0330/master
Add Local_WLAN_Borrower payload
2024-08-29 03:48:05 -04:00
Yeet 64a7666c12
Update payload.txt 2024-08-29 10:07:57 +10:00
Yeet 0e9ea1358b
Update README.md
Made the README.md worth reading
2024-08-29 10:07:34 +10:00
Peaks ad08ba6e36
Merge pull request #474 from PlumpyTurkey/master
Fix “Windows Product Key Grabber” payload
2024-08-23 05:27:29 -04:00
Yeet a1a7310d61
Added 1.ps1 file
this file borrows and stores the wifi passwords.
2024-08-23 10:11:24 +10:00
Yeet 04b71efc9b
Create README.md
added cool readme.md to describe my payload
2024-08-23 10:10:35 +10:00
Yeet ca6490cc9a
Create payload.txt 2024-08-23 10:06:44 +10:00
Julien M e4a7876a00 Update version badge 2024-08-22 22:17:24 +02:00
Julien M f7d2f37def Remove duplicate function 2024-08-22 22:16:56 +02:00
Peaks d02b817225
Merge pull request #400 from aleff-github/patch-80
Exfiltrate Windows Product Key
2024-08-21 18:42:57 -04:00
Alessandro Greco 828c60acca Adapted with DUCKY_DRIVE_LABEL 2024-08-21 07:41:47 +02:00
Peaks 404640f615
Merge pull request #427 from aleff-github/patch-83
Extension: SAVE FILES IN RUBBER DUCKY STORAGE
2024-08-20 17:04:28 -04:00
Alessandro Greco 9e6b405745 from - to _ 2024-08-20 12:33:10 +02:00
Alessandro Greco c895160753 from - to _ 2024-08-20 12:27:36 +02:00
Peaks 5c1ec51393
Merge pull request #470 from nathansb2022/master
Create Kill-Explorer.txt
2024-08-17 18:28:48 -04:00
Nate afe674fcda
Create README.md 2024-08-06 19:30:25 -05:00
Nate a9afcc0c6d
Create Kill-Explorer.txt
initial commit with ducky script
2024-08-06 19:29:22 -05:00
Peaks e1531cc317
Merge pull request #468 from nathansb2022/master
Create payload DNS-TXT-CommandInjection.txt
2024-08-06 17:19:17 -04:00
Peaks d08e573962
Merge pull request #469 from thomasboegl1/master
Add Windows-Screenshot-Exfil payload
2024-08-06 17:14:00 -04:00
Thomas Boeglin f0cb608d09 Add Windows-Screenshot-Exfil payload 2024-08-06 09:58:39 +02:00
Nate f2896f0b6f
Update DNS-TXT-CommandInjection.txt
Added PASSIVE_WINDOWS_DETECT EXTENSION per requested changes in pull request.
2024-08-05 14:21:46 -05:00
Nate 8eba7c5e9b
Delete payloads/library/execution/Kill-Explorer directory 2024-08-04 20:13:49 -05:00
Nate 5928326db7
Update README.md 2024-08-04 20:08:11 -05:00
Nate 42d2d6e9d5
Create Kill-Explorer.txt 2024-08-04 20:07:36 -05:00
Nate 97ae3a7339
Create README.md 2024-08-04 20:06:35 -05:00
Nate e1c39bd455
Create DNS-TXT-CommandInjection.txt
Made changes requested from pull request. 1. Please remove this file as it is not needed. - removed .gitignore
2. I would recommend using a REM_BLOCK - added REM_BLOCK
3. I would include all of this in your readme.md it should contain all of this information. Having it in the payload clutters up the actually payload content. - Removed the clutter
4. If your target machine is windows you can use the PASSIVE_WINDOWS_DETECT extension. This extension will dynamically determine start delay and also ensure that the payload is ran on the correct OS. - added EXTENSION PASSIVE_WINDOWS_DETECT and updated the extension to new version. Ended up with the payload not executing.So, removed extension added in delay.
5. I would recommend using STRINGLN - added STRINGLN
6. also make sure to have a # before your DEFINE calls. #MY_TARGET_URL - added the # to MY_TARGET_URL
7. Why is this ps1 included? - removed ConvertBase64.ps1
8. Why is this file included? this is just a .txt of the powershellReverseShellOne-liner.ps1 file you uploaded. - removed T1.txt
2024-08-04 18:08:21 -05:00
Nate f43a37e607
Create powershellReverseShellOne-liner.ps1
updated comments
2024-08-04 18:04:18 -05:00