0iphor13
be1bee34dc
Update README.md
2023-03-02 12:59:03 +01:00
0iphor13
92b3a01b19
Added guard rails
...
Added guard rails to payload via passive_windows_detect to prevent using the wrong OS
2023-03-02 12:54:11 +01:00
Julien Morice
0122c6a966
Add files via upload
2023-03-02 11:42:26 +01:00
Julien Morice
b96d41862f
Add files via upload
2023-03-02 11:41:56 +01:00
0iphor13
928c8799f1
Changed Formatting
2023-03-01 14:57:46 +01:00
0iphor13
c8a3960114
Merge branch 'hak5:master' into master
2023-03-01 14:56:40 +01:00
aleff-github
22869c4970
Replaced link redirections with link instruction
2023-03-01 12:05:59 +01:00
aleff-github
839f6dd6b2
Replaced link redirections with link instruction
2023-03-01 12:04:30 +01:00
aleff-github
ef20e0dfa2
Replaced link redirections with link instruction
2023-03-01 12:02:05 +01:00
aleff-github
2303cb5988
style guidelines update
2023-03-01 11:57:33 +01:00
aleff-github
3290dc9ae5
Replaced link redirections with link instruction
2023-03-01 10:28:27 +01:00
Dallas Winger
9e3719b22f
remove inject.bin
2023-02-28 08:45:39 -05:00
nejc26
cab0e1942c
Delete sourceCode.txt
...
The correct "sourceCode.txt" is in DevilsCupid folder.
This was a duplicate.
2023-02-28 14:08:12 +01:00
0iphor13
a1ee63bf93
Update README.md
2023-02-28 13:42:24 +01:00
0iphor13
9329c28819
Update README.md
2023-02-28 13:39:59 +01:00
0iphor13
1547d558ca
Uploaded ReverseDuckyUltimate
2023-02-28 13:39:29 +01:00
nejc26
af3b9f6e89
Added README, Added files to folder
...
Added README
Added DevilsCupid files from "credentials" to the DevilsCupid folder.
2023-02-28 12:34:54 +01:00
Dallas Winger
6f70fd1335
Merge pull request #235 from nejcpirecnik/master
...
Devil's Cupid 1.0
2023-02-28 06:23:05 -05:00
nejc26
0c02bb7e86
Updated DEFINE to include example.com
2023-02-28 11:39:38 +01:00
nejc26
3624ef0a61
Update sourceCode.txt
...
Used DEFINE
2023-02-27 12:26:06 +01:00
Dallas Winger
fa33aec6df
Merge pull request #227 from 0iphor13/master
...
Created Extension: Rolling_Powershell_Execution
2023-02-27 04:24:10 -05:00
Dallas Winger
f9b84435c5
Merge pull request #237 from Who-Is-Julien/master
...
Added payload "Windows Product Duckey"
2023-02-27 04:23:50 -05:00
Dallas Winger
1b8ddc8599
Merge pull request #236 from cribb-it/MorseCode
...
New Payload - Morse Code
2023-02-27 04:16:16 -05:00
Julien Morice
3378957961
added payload Windows Product Duckey
2023-02-24 18:15:17 +01:00
Julien Morice
05f5b9c401
added README.md
2023-02-24 18:14:26 +01:00
cribb-it
d9dc3c81a5
New Payload - Morse Code
2023-02-24 15:25:57 +00:00
nejc26
da5e96bd91
Update sourceCode.txt
2023-02-24 14:55:47 +01:00
nejc26
6cb390e454
Update sourceCode.txt
2023-02-24 14:54:26 +01:00
nejc26
4351024923
Devil's Cupid
...
Trick your target into sharing their credentials through a fake authentication pop up message.
2023-02-24 14:40:19 +01:00
0iphor13
939e63bb11
Update Rolling_Powershell_Execution
...
Updated formatting so extension can be properly collapsed
2023-02-24 12:13:00 +01:00
0iphor13
7c809ca7c0
Merge branch 'hak5:master' into master
2023-02-24 12:11:50 +01:00
Dallas Winger
dae7a2f577
Merge pull request #229 from zoeruda/master
...
Add payload
2023-02-23 16:28:28 -05:00
Dallas Winger
0277ca37e0
Merge pull request #232 from cribb-it/DuckSong
...
New Payload - Hey! Got Any Grapes?
2023-02-23 16:23:04 -05:00
whitedevil-tmp
6077adab28
small error fix
2023-02-23 19:46:42 +05:30
cribb-it
b127e3c455
Update - Grammer
2023-02-22 17:45:00 +00:00
cribb-it
b872da601e
New Payload - Hey!, Got Any Grapes?
2023-02-22 17:30:55 +00:00
zoeruda
9077530310
Merge branch 'hak5:master' into master
2023-02-21 11:53:06 -05:00
Zoe Ronen
7f9d80eed3
fix variable call
2023-02-19 03:39:28 -05:00
zoeruda
163870dda3
add definition
...
use DEFINE instead of forcing user to randomly find and replace an arbitrary string.
2023-02-17 14:51:02 -05:00
zoeruda
f6ef9626c3
specify target
2023-02-17 14:18:47 -05:00
zoeruda
7da6d8ea41
fix
2023-02-17 12:17:55 -05:00
0iphor13
b963bb6403
Created Extension: Rolling_Powershell_Execution
...
Start Powershell in different ways through obfuscation, uncommon start paramters and randomisation.
This extension may help to evade basic and bad detection methods of starting powershell.
2023-02-17 12:58:11 +01:00
Dallas Winger
5bb2aeb90f
Merge pull request #223 from HackingMark/master
...
New Payload added
2023-02-16 13:26:17 -05:00
HackingMark
cd5b5d8ab4
Update payload.txt
2023-02-16 12:29:14 +01:00
Dallas Winger
0ed7d44321
Merge pull request #216 from Lumen-git/patch-1
...
Create PSA.txt
2023-02-16 00:10:46 -05:00
Aidan Moran
6a63b16cf0
Added example.com DEFINE statements and instructions on how to host
2023-02-15 22:23:41 -06:00
Dallas Winger
a824ba0134
fix missing ENTER(s)
2023-02-15 14:02:19 -05:00
Dallas Winger
1ff50b530e
Merge pull request #222 from hak5/deshellerator
...
Deshellerator
2023-02-13 19:07:58 -05:00
Zoe Ronen
b027af3ff6
fix typo
2023-02-12 03:43:27 -05:00
Zoe Ronen
e7cffd1cd8
add payload
2023-02-12 03:39:36 -05:00
HackingMark
dc58bff435
Add Readme
2023-02-09 15:09:02 +01:00
HackingMark
db3570d5a6
Update README.MD
2023-02-09 15:06:36 +01:00
HackingMark
6e08486383
Update README.MD
2023-02-09 15:05:57 +01:00
HackingMark
48f82ba061
Add files via upload
2023-02-09 15:04:22 +01:00
HackingMark
bef7515421
Add files via upload
2023-02-09 14:58:15 +01:00
HackingMark
58fd39e313
Media for Readme
2023-02-09 14:36:39 +01:00
HackingMark
10d7c0e7bb
New Payload added
...
This payload spawns a Hoaxshell via Villain Payload using a NGROK Tunnel.
Of course there are several ways incl encryption, its just an easy to update POC.
It helps to easy apadt the Payload to new Session Identifier which are onetime values.
2023-02-09 13:36:12 +01:00
Dallas Winger
e132d9335a
optimize per suggestion by Darren
2023-02-04 20:00:17 -05:00
Dallas Winger
78812cfe0b
formatting
2023-02-04 19:38:39 -05:00
Dallas Winger
4bf5333f94
initial payload commit
2023-02-04 19:36:34 -05:00
Dallas Winger
f9c1d905cb
bump version, add to authors
2023-02-04 04:40:25 -05:00
Dallas Winger
675f530197
small fixes
2023-02-04 03:40:57 -05:00
Dallas Winger
abca0569e5
fix copypasta
2023-02-03 17:31:24 -05:00
Dallas Winger
a2fb369855
Merge pull request #217 from Abelkrijgtalles/patch-1
...
Fix typo
2023-02-02 01:02:23 -05:00
Dallas Winger
21f08ca5aa
Merge pull request #218 from hak5/chromebook_provisioning_payload
...
example chromebook provisioning payload
2023-01-27 20:17:10 -05:00
Ray
874d0968f1
Merge branch 'master' of https://github.com/MocconaCoffee/usbrubberducky-payloads
2023-01-28 02:20:04 +11:00
Ray
04c5aaf33f
Delay optimisations
2023-01-28 02:18:06 +11:00
Dallas Winger
6ac9b58789
Merge pull request #199 from ECTO-1A/patch-3
...
Create mactalk.txt
2023-01-26 18:30:20 -05:00
Dallas Winger
f9639902e4
fix LED commands
2023-01-26 16:38:22 -05:00
Dallas Winger
8d4be3e21c
add updated DS3 example chromebook provisioning payload
2023-01-26 16:35:37 -05:00
Abel
b3ed1f5788
Fix typo
2023-01-26 19:44:19 +00:00
Aidan Moran
1bd77b766a
Adding secondary files
2023-01-19 18:50:53 -05:00
Aidan Moran
981d11db2e
Create PSA.txt
2023-01-19 18:48:46 -05:00
Alessandro
83d855faa6
Update Link
2023-01-13 08:27:33 +01:00
Alessandro
54c4497bf6
Upload PowerShell script
2023-01-13 08:26:27 +01:00
Alessandro
fc71e57e7c
Update Link
2023-01-13 08:24:30 +01:00
Alessandro
4abb105f82
Upload PowerShell script
2023-01-13 08:22:42 +01:00
Alessandro
9991e32277
Update PowerShell script link
2023-01-13 08:19:53 +01:00
Alessandro
b0bbd6d94e
Upload powershell script
2023-01-13 08:18:33 +01:00
Alessandro
f7ece85684
Update payload link
2023-01-13 07:52:07 +01:00
Alessandro
8110d9dee7
Update python script link
2023-01-13 07:51:07 +01:00
Alessandro
aff8e6ccdf
Update README.md
2023-01-13 07:49:24 +01:00
Alessandro
fda8621c16
Upload scripts
2023-01-13 07:48:44 +01:00
Alessandro
bf66612770
Fix powershell permissions
2023-01-12 18:18:32 +01:00
Alessandro
0e6904c3b3
Create payload.txt
2023-01-12 17:21:40 +01:00
Alessandro
59f77865a2
Update some REM
2023-01-11 21:15:12 +01:00
Alessandro
df50452146
Define const
2023-01-11 21:14:05 +01:00
Alessandro
0cfe2eb227
Update payload.txt
2023-01-11 21:08:57 +01:00
Alessandro
157a6fd4d1
Send Signal Messages
2023-01-11 21:05:38 +01:00
Alessandro
f4e7e520d6
DEFINE Discord Webhook
2023-01-11 19:55:13 +01:00
Alessandro
a37db33c40
DEFINE Discord Webhook
2023-01-11 19:53:16 +01:00
Alessandro
b62c94a1c7
Update wrong link
...
New Link: bit.ly/ENG-WLAN-Windows-Password
2023-01-11 09:17:58 +01:00
Alessandro
dfca1ced37
Defined Discord Webhook
2023-01-11 08:58:31 +01:00
Alessandro
8a5679a9e4
Update payload.txt
2023-01-11 08:29:17 +01:00
Dallas Winger
fe62ddecfb
replace old url for comment
2023-01-10 22:23:59 -05:00
Dallas Winger
9d5c906f14
add USBScream payload updated for DS3
2023-01-10 22:10:03 -05:00
Dallas Winger
1b6363af83
Merge pull request #197 from 0iphor13/master
...
Uploaded ReverseDuckyPolymorph
2023-01-10 20:31:10 -05:00
Dallas Winger
9dac04ff9c
Merge pull request #209 from irrrwin/patch-1
...
Create payload.txt
2023-01-10 20:29:42 -05:00
irrrwin
eafb8ea54c
Create payload.txt
2023-01-10 23:02:31 +01:00
Alessandro
53d0934c62
Create payload.txt
2023-01-08 20:11:13 +01:00
Alessandro
df9946e100
ProtonVPN config
2023-01-08 19:38:46 +01:00
Alessandro
3537551291
Windows-netstat-to-Discord-Exfiltration
2023-01-08 19:32:23 +01:00
joon
148e5e49ff
Piano player payload generator
2023-01-06 00:35:39 -08:00
Dallas Winger
efc5dc983d
Merge pull request #200 from H4K0N42/patch-1
...
Update payload.dd
2023-01-03 15:10:50 -05:00
Dallas Winger
be8d89ae52
Merge pull request #203 from cribb-it/AndroidBrute
...
Update - Spelling
2023-01-03 15:10:43 -05:00
cribb-it
02d3978d33
Update - Spelling
2023-01-03 19:48:31 +00:00
hak5glytch
8f720110d3
Merge pull request #201 from cribb-it/AndroidBrute
...
New Payload - Brute Force
2023-01-02 14:31:50 -08:00
cribb-it
66251bddc0
New Payload - Brute Force
2023-01-01 14:02:38 +00:00
Hagen
2eb370aab3
Update payload.dd
...
Updated "Get Admin-Permission" part
2022-12-23 15:47:04 +01:00
ECTO-1A
97ead7a9af
Create mactalk.txt
2022-12-20 16:47:33 -05:00
0iphor13
0d2b9a8c2e
Merge branch 'hak5:master' into master
2022-12-20 12:46:58 +01:00
0iphor13
54b945e2e3
Update README.md
2022-12-19 22:11:26 +01:00
0iphor13
baea225dab
Uploaded ReverseDuckyPolymorph
...
A tcp reverse shell executed by the rubber ducky. It changes it's variables with every new attack
2022-12-19 22:09:33 +01:00
UberGuidoZ
8fa0273f2c
Minor typo fixed (since award winner and all...)
2022-12-17 18:33:11 -08:00
Darren Kitchen
f60c67671e
Update payload.txt
...
fixed invalid DEFINE usageon line 22 to confirm with spec: https://docs.hak5.org/hak5-usb-rubber-ducky/attack-modes-constants-and-variables/constants#valid-usage
2022-12-16 13:04:22 -06:00
Darren Kitchen
fe5b6fead9
Merge pull request #190 from atomiczsec/master
...
New Payload - Priv-Paths
2022-12-16 13:03:13 -06:00
Darren Kitchen
11c0246bab
Merge pull request #186 from dsymbol/master
...
ProcessTerminator Payload
2022-12-16 12:55:27 -06:00
Darren Kitchen
2100598aa7
Merge pull request #187 from MocconaCoffee/patch-1
...
Update payload.txt
2022-12-16 12:54:03 -06:00
atomic
2093bea63e
Update README.md
2022-12-13 20:09:41 -05:00
atomic
285fe6f909
Add files via upload
2022-12-13 20:09:19 -05:00
KryptoKola
46affd61c6
payload.txt
...
This payload will Enable SSH on an android device with Termux installed. Termux should be installed through F-Droid for best results (this will ensure the correct repos are in use). This has been tested with android tablets and phones.
2022-12-13 00:55:03 -05:00
R Λ Y
f8fecdf11a
Update payload.txt
...
Add detailed description and notes.
2022-12-12 22:19:10 +11:00
dsymbol
f6ed30e2f3
one liner
2022-12-09 11:25:36 +02:00
dsymbol
85a96dc114
Process Terminator
2022-12-09 01:39:02 +02:00
atomic
b1ebbcf219
Add files via upload
2022-12-07 20:58:51 -05:00
Dallas Winger
274537ff7c
Merge pull request #182 from atomiczsec/master
...
New Payload - cApS-Troll
2022-12-07 04:03:14 -05:00
barbo186
438a616fc2
Update MonaLisa.txt
2022-12-01 23:16:16 +01:00
0iphor13
67673e78c2
Update ReverseDuckyII.txt
2022-11-25 11:57:48 +01:00
0iphor13
630392c69d
Updated ReverseDucky2 to version 2
...
- Added DuckyScript 3.0 usage
- Inserting into non Windows machines, the Ducky won't execute the payload and will appear broken
2022-11-24 17:34:20 +01:00
atomic
0518880689
Add files via upload
2022-11-21 17:03:36 -05:00
hak5glytch
5294cc938b
Merge pull request #178 from atomiczsec/master
...
New Payload - Printer-Recon
2022-11-17 12:41:21 -08:00
hak5glytch
fe3f63a124
Merge pull request #175 from HackingMark/master
...
Disabling Defender on Win 22H2 Maschines
2022-11-17 12:37:03 -08:00
atomic
fb126afd3a
Update payload.txt
2022-11-16 13:35:56 -05:00
atomic
614099b6ae
Merge branch 'hak5:master' into master
2022-11-16 13:35:28 -05:00
0iphor13
cd6a5ccdda
Updated Description
...
ReverseDucky3 has reached its end of life because of useability and therefore won't be uodated by me anymore
2022-11-16 14:41:21 +01:00
0iphor13
da765c18a4
Updated ReverseDucky to version 2.0
...
Updated ReverseDucky to use DuckyScript 3.0.
-Increased reliability
-more verbosity
-easier to use
Still defeats default MS Defender
2022-11-16 14:33:42 +01:00
0iphor13
8e36f8adeb
Update README.md
2022-11-16 07:42:52 +01:00
0iphor13
7c08688b3a
Update README.md
2022-11-16 07:42:14 +01:00
0iphor13
fb4dd7625e
Add files via upload
2022-11-16 07:41:09 +01:00
0iphor13
d472b9234a
Update payload.txt
2022-11-16 07:37:13 +01:00
0iphor13
a56aac03d5
Update README.md
2022-11-16 07:32:30 +01:00
0iphor13
dee8192fe2
Update to version 1.2
...
changed default address
deleted unnecessary lines
2022-11-16 07:32:05 +01:00
0iphor13
7bb1f4ce75
Update README.md
2022-11-15 17:34:55 +01:00
0iphor13
8d3de62f53
Set default INSTALL to FALSE
2022-11-15 17:31:41 +01:00
0iphor13
3623150348
Update README.md
2022-11-15 17:29:09 +01:00
0iphor13
6aaace4a26
Uploaded PingZhellDucky
...
Get remote access via ICMP or setup the required infrastructre
2022-11-15 17:24:48 +01:00
0iphor13
dccc947ffa
Rename payloads/extensions/windows_elevated_execution to payloads/extensions/community/windows_elevated_execution
2022-11-15 11:14:29 +01:00
HackingMark
a1931216b0
Update Disable_Windows_Defender.txt
...
Fixed Formatting
2022-11-15 08:13:46 +01:00
atomic
dd3bc264c4
Add files via upload
2022-11-14 22:40:59 -05:00
0iphor13
9a3aff1daf
Update and rename Windows_Elevated_Execution to windows_elevated_execution
2022-11-14 11:24:40 +01:00