Commit Graph

523 Commits (f9c1d905cb09fea8ba09a05e3d1ab9e4b6d19545)

Author SHA1 Message Date
Darren Kitchen d1cccaa8ed
Ducky WiFi Grabber 2021-08-17 10:38:23 -05:00
Marc abb624b1d0
Misc: Cleanup Repository 2021-08-17 16:35:49 +01:00
Darren Kitchen edfc8ee726
Merge pull request #15 from Zero-Sploit/patch-2
Disable_Windows10_Defender
2021-08-17 10:34:44 -05:00
Zero-Sploit 511d745294
Create payload.txt 2021-08-17 05:45:26 -04:00
Zero-Sploit e83f7bdc9c
Create payload.txt 2021-08-17 05:38:41 -04:00
0iphor13 01de78b311
Uploaded ReverseDuckyII (#11)
ReverseDucky2 - A faster way to gain a reverse shell & easier to configure

Obfuscated Powershell code to bypass AMSI & Windows Defender.
2021-08-10 21:31:25 +01:00
Alex007-CyberGuy e84b1b1338
Gain knowledge from the Tree (#12)
* Useful Reconnaissance Payload 

New payload based on the potential of the "tree" command.

* Update readme.md

* Update readme.md

* Update readme.md

* Update readme.md

* Delete library/payloads/recon/Tree of Knowledge/Bonus directory

I removed the exe

* Update readme.md

* Rename library/payloads/recon/Tree of Knowledge/readme.md to library/payloads/recon/Tree_of_Knowledge/readme.md

* Rename library/payloads/recon/Tree_of_Knowledge/readme.md to library/payloads/recon/Tree of Knowledge/readme.md

* Delete library/payloads/recon/Tree of Knowledge directory

* Gain knowledge from the Tree

Grabs the names of all the files on a victim's pc and hides them from prying eyes.
2021-08-10 21:24:42 +01:00
0iphor13 59cc824b0f
Uploaded ReverseDuckyII
ReverseDucky2 - A faster way to gain a reverse shell & easier to configure

Obfuscated Powershell code to bypass AMSI & Windows Defender.
2021-08-05 10:52:17 +02:00
Jack Matthews c4d8d44e9d
Create payload.txt 2021-07-28 10:39:32 +10:00
John Fawcett 182a9a1859
Hotfix Warning (#1)
* Add files via upload

A very simple payload to just show current hotfixes and then display a message warning the victim not to trust random USB sticks.  Can change timing to possibly make quicker

* A quick payload to display hotfixes and then display a hacked message so user will not plug in strange USB sticks in the future.

* Delete ducky_script.txt
2021-07-21 01:18:53 +01:00
Marc 116ed971ec
Merge pull request #8 from 0iphor13/master
ReverseDucky
2021-07-21 01:16:22 +01:00
Marc ee2372dc4c
Merge pull request #9 from jessiecrimsonhart/patch-1
Canary Duck
2021-07-21 01:15:25 +01:00
Jessie Crimson Hart 9604873d01
Create payload.txt
version 1.0
2021-07-17 14:42:58 -07:00
0iphor13 f15faa5414
Update ReverseDucky.txt 2021-07-17 21:32:15 +02:00
0iphor13 ff6d8c94b4
Update ReverseDucky.txt 2021-07-17 21:19:13 +02:00
0iphor13 389a11d5ad
ReverseDucky
An obfuscated reverse shell, executed directly in powershell, hidden in the background.
2021-07-17 21:15:35 +02:00
Jonny Banana 5d0eeeaa52
Create payload.txt
A quickly Rubber Ducky HTML Fork Bomb Attack.
2021-07-15 02:47:25 +02:00
Jonny Banana 31bdc108fe
Create payload.txt
A Simple Script for Rubber Ducky which Exploits Windows $MFT Vulnerability.
$MFT is used by NTFS systems to manage some metadata. Works on windows 7, 8 and vista, dont work on windows 10. I think work on Xp and earlier. The system crash lasts until the machine is switched off, or until the blue screen of death appears
2021-07-15 02:46:12 +02:00
Jonny Banana 911cb5f2cf
Create payload.txt
Requirements
-none

How it works?

The script is a One-Liner and  call an html page with a css webkit filter attack inside, this webpage crash the system ... 

webpage with the exploit here: https://github.com/JonnyBanana/safari-ie-reaper.github.io
2021-07-15 02:43:54 +02:00
Jonny Banana e952d30053
Create payload.txt
A very quickly script for rubber ducky which exploits the gatherNetworkInfo.vbs file in the
C:\Windows\System32 folder to steal different information from the victim machine.
2021-07-15 02:37:27 +02:00
Marc 44b99d3ef4
Repo: Put payload categories inside of library/payloads 2021-07-14 00:17:19 +01:00
Marc 9425c45f7d
Repo: Add structure 2021-07-14 00:13:33 +01:00
Marc 2e5313e9ef
Initial Commit 2021-07-14 00:07:00 +01:00