Commit Graph

100 Commits (cca66cbddbb23c6be7a583638ee3355ba16d21ce)

Author SHA1 Message Date
drapl0n 7e02e640ae upload duckNet 2022-02-17 00:07:33 +05:30
nullsession0x 54badf8c20
WifiPassGrabberPOST
This is a ducky script to grab WiFi passwords from Windows machine and submit to webserver via POST request.
Tested on Windows 10 Professional (without UAC enabled and a user with local administrator rights).
Script crafted by @Nullsession0x. Credit to @hum4nG0D for the idea.
2022-02-16 16:35:49 +00:00
nullsession0x eac8f2ca65
Delete payload.txt 2022-02-16 16:33:34 +00:00
nullsession0x 7873e4d093
WifiPassGrabberPOST 2022-02-16 16:30:47 +00:00
cribb-it 2a1596a1fe Update - ReadMe 2022-02-15 18:33:44 +00:00
Dean A 0c29939738
Create payload.txt
I hope you enjoy :)
2022-02-14 16:29:08 +10:00
drapl0n tuxed0 c6e7ad9c09
adding duckyLoggerDecoder (#35)
* adding readme

* uploading duckyLoggerDecoder
2022-02-13 18:21:42 +00:00
drapl0n tuxed0 cd25ed3089
adding readme for DuckyLogger (#34) 2022-02-13 18:09:52 +00:00
drapl0n tuxed0 4b91d17539
Uploaded DuckyLogger
Check out: https://github.com/drapl0n/DuckyLogger for usage and instructions.
2022-02-11 23:59:41 +05:30
drapl0n tuxed0 9ab0dcb640
Create payload.txt
Check out more at: https://github.com/drapl0n/persistentReverseDucky
2022-02-09 00:31:45 +05:30
drapl0n tuxed0 8f33b0039b
PwnKit Payload (#30)
* Create payload.txt

* taking payload offline by embedding exploit

* changing payload name
2022-02-08 15:28:20 +00:00
cribb-it d20628e466
Initial release (#28) 2022-02-02 01:08:35 +00:00
cribb-it 5f6175e8da New Payload - Ascii Mona Lisa 2022-02-01 20:17:43 +00:00
0iphor13 8e3cb48211
Uploaded ReverseDuckyIII
As all good things come in three, here's another ReverseDucky.

This time a udp reverse shell. Not as nice and comfortable as a tcp shell, but shell is shell <3
2022-01-31 11:37:15 +01:00
0iphor13 f0428f7f8a
Updated ReverseDucky to version 1.3 (#25)
- Changed code 
- Changed shell design
2021-12-06 20:07:37 +00:00
0iphor13 169aa7a429
Updated ReverseDucky 2 to version 1.2
+ Shorten the code
+ Changed shell design
+ Updated Defender bypass
2021-10-29 09:19:21 +02:00
Dante Sparda b6267ba1ab
Create datacopier 2021-10-12 13:05:22 -04:00
0iphor13 8b913fa00c
Update ReverseDucky 1.1 to Version 1.2 (#22)
Shorten the code to increase the speed
2021-09-30 15:39:47 +01:00
Marc 63b1903934
misc: Remove .DS_Stores, add to git ignore 2021-09-30 15:20:46 +01:00
Darren Kitchen 889f0a259b
Merge pull request #19 from tommym89/patch-1
Rubber-Ducky_RickRoll
2021-09-15 14:47:58 -05:00
HokkaidoInu 55ab267ca4
Create payload.txt (#21) 2021-09-13 22:30:01 +01:00
HokkaidoInu 0a0a7aab94
Create payload.txt (#20) 2021-09-13 22:29:04 +01:00
Darren Kitchen 6cf5620afa
Update payload.txt
replace # with REM
2021-09-09 16:42:50 -05:00
Tommy c0e4581f36
Create payload.txt 2021-09-07 11:24:56 -05:00
Darren Kitchen 031b58799f
Merge pull request #3 from JonnyBanana/patch-1
gathernetworkInfo
2021-08-27 08:29:33 -05:00
Darren Kitchen 04dab14d14 updated DUCKY_REAPER comments 2021-08-27 08:28:20 -05:00
Darren Kitchen 9715e1bde6
Merge pull request #4 from JonnyBanana/patch-2
DUCKY_REAPER
2021-08-27 08:26:31 -05:00
Darren Kitchen 256633dac0 updated $MFT-Duck-Crasher comments 2021-08-27 08:25:19 -05:00
Darren Kitchen 47ddb0a72f Merge branch 'master' of https://github.com/hak5/usbrubberducky-payloads 2021-08-27 08:23:44 -05:00
Darren Kitchen 166e53b927
Merge pull request #5 from JonnyBanana/patch-3
Exploits Windows $MFT Vulnerability
2021-08-27 08:23:23 -05:00
Darren Kitchen f0ac0d6c9b
Merge pull request #6 from JonnyBanana/patch-4
HTML Fork Bomb by Jonny Banana
2021-08-27 08:21:15 -05:00
Darren Kitchen d0c57ed9c8 Moved ReverseDucky and ReverseDuckyII into their own directories 2021-08-27 08:20:10 -05:00
Darren Kitchen 4fedd73991 Moved DuckyHelper into its own directory and added .txt extension 2021-08-27 08:18:15 -05:00
0iphor13 f08f904bd2 Deleted unnecessary line
Deleted unnecessary line, which was used twice
2021-08-27 11:02:29 +02:00
0iphor13 051ff3c554 Merge remote-tracking branch 'upstream/master' 2021-08-26 19:09:25 +02:00
Marc 2509641d36
Credentials: Fix directory name for password grabber 2021-08-17 16:49:38 +01:00
Marc c3c25360df
Merge branch 'master' of github.com:hak5/usbrubberducky-payloads 2021-08-17 16:47:46 +01:00
Marc 1416a4a9f4
Misc: Fix structure of repository 2021-08-17 16:47:32 +01:00
Darren Kitchen 50b685ac73
Merge pull request #10 from makozort/patch-1
windows password grabber
2021-08-17 10:41:38 -05:00
Darren Kitchen 625abb070c
Merge pull request #14 from Zero-Sploit/patch-1
Ducky WiFi Grabber
2021-08-17 10:39:39 -05:00
Darren Kitchen d1cccaa8ed
Ducky WiFi Grabber 2021-08-17 10:38:23 -05:00
Marc abb624b1d0
Misc: Cleanup Repository 2021-08-17 16:35:49 +01:00
Zero-Sploit 511d745294
Create payload.txt 2021-08-17 05:45:26 -04:00
Zero-Sploit e83f7bdc9c
Create payload.txt 2021-08-17 05:38:41 -04:00
Jack Matthews c4d8d44e9d
Create payload.txt 2021-07-28 10:39:32 +10:00
Jessie Crimson Hart 9604873d01
Create payload.txt
version 1.0
2021-07-17 14:42:58 -07:00
Jonny Banana 5d0eeeaa52
Create payload.txt
A quickly Rubber Ducky HTML Fork Bomb Attack.
2021-07-15 02:47:25 +02:00
Jonny Banana 31bdc108fe
Create payload.txt
A Simple Script for Rubber Ducky which Exploits Windows $MFT Vulnerability.
$MFT is used by NTFS systems to manage some metadata. Works on windows 7, 8 and vista, dont work on windows 10. I think work on Xp and earlier. The system crash lasts until the machine is switched off, or until the blue screen of death appears
2021-07-15 02:46:12 +02:00
Jonny Banana 911cb5f2cf
Create payload.txt
Requirements
-none

How it works?

The script is a One-Liner and  call an html page with a css webkit filter attack inside, this webpage crash the system ... 

webpage with the exploit here: https://github.com/JonnyBanana/safari-ie-reaper.github.io
2021-07-15 02:43:54 +02:00
Jonny Banana e952d30053
Create payload.txt
A very quickly script for rubber ducky which exploits the gatherNetworkInfo.vbs file in the
C:\Windows\System32 folder to steal different information from the victim machine.
2021-07-15 02:37:27 +02:00