Blue_Harvester

Blue_Harvester
Download Copy
Title: Blue_Harvester
Author: LulzAnarchyAnon

This is a Three stage payload that begins by opening bluetooth file transfer on the target device. Next the attackers bluetooth adapter name is selected for pairing. In the second stage the last folder opened is selected followed by all of the files in the folder being selected, and added to the transfer cue. The Third, and final stage authenticates, and allows pairing between the attacker, and the target device. Afterwards the selected files are transferred to the attackers device via bluetooth. I selected the pictures/camera roll folder as a default for this payload, but it can be changed. Depending on both devices certain variables will need to be adjusted in order for this payload to run correctly. At the beginning of the Second stage "k" is for kali (adapter name) as it is the attacker device used for payload. NOTE: Make sure your device is Discoverable... The cursor coordinates x,y on the screen may vary depending on device... A Pairing request will pop up, hit CONFIRM... A Pairing accept will pop up, hit CONFIRM

🏆   Recognized with a Payload Award in September 2023

 

Execution is the method of either remotely or locally running code — malicious or otherwise — on a target computer. Execution is typically coupled with other techniques to carry out more complex tasks, like performing reconnaissance, exfiltration or credential harvesting. Execution may be ephemeral, or coupled with persistence techniques used to maintain remote access or continued code execution. See all execution payloads.

This payload is for OMG — a platform built for covert field-use with features that enhance remote execution, stealth and forensics evasion, all while being able to quickly change your tooling on the fly.

Submit your own payload, or browse more featured OMG Payloads.

 

 

Related Payloads

TCPDump
TCPDump
Dumps networking-data to USB storage. Completes on button-press or storage full.
Read More
Minimalistic web intercept
Minimalistic web intercept
Replace HTTP with Squirrels.
Read More
DNS Sinkhole
DNS Sinkhole
Demonstrate sinkholing a DNS domain
Read More