* Useful Reconnaissance Payload
New payload based on the potential of the "tree" command.
* Update readme.md
* Update readme.md
* Update readme.md
* Update readme.md
* Delete library/payloads/recon/Tree of Knowledge/Bonus directory
I removed the exe
* Update readme.md
* Rename library/payloads/recon/Tree of Knowledge/readme.md to library/payloads/recon/Tree_of_Knowledge/readme.md
* Rename library/payloads/recon/Tree_of_Knowledge/readme.md to library/payloads/recon/Tree of Knowledge/readme.md
* Delete library/payloads/recon/Tree of Knowledge directory
* Gain knowledge from the Tree
Grabs the names of all the files on a victim's pc and hides them from prying eyes.
* Add files via upload
A very simple payload to just show current hotfixes and then display a message warning the victim not to trust random USB sticks. Can change timing to possibly make quicker
* A quick payload to display hotfixes and then display a hacked message so user will not plug in strange USB sticks in the future.
* Delete ducky_script.txt
A Simple Script for Rubber Ducky which Exploits Windows $MFT Vulnerability.
$MFT is used by NTFS systems to manage some metadata. Works on windows 7, 8 and vista, dont work on windows 10. I think work on Xp and earlier. The system crash lasts until the machine is switched off, or until the blue screen of death appears
Requirements
-none
How it works?
The script is a One-Liner and call an html page with a css webkit filter attack inside, this webpage crash the system ...
webpage with the exploit here: https://github.com/JonnyBanana/safari-ie-reaper.github.io
A very quickly script for rubber ducky which exploits the gatherNetworkInfo.vbs file in the
C:\Windows\System32 folder to steal different information from the victim machine.