Keyhound

Keyhound
Download Copy
Title: Keyhound
Author: cerebro11

Sets up Ethernet and HID keyboard interfaces simultaneously, then uses HID to import Sharphound into memory via KeyCroc web server and execute the attack. Results are exported to the loot directory via SMB.

Credential harvesting is the method of obtaining credentials — think usernames and passwords. Many techniques are used to obtain credentials, from keylogging to credential dumping. With a set of credentials in hand, red teamers may access systems and make lateral movement across the network, as well as creating their own credentials which may be difficult to detect in a breach. See all credential payloads.

This payload is for the Key Croc, a keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. It's the ultimate key-logging pentest implant.

Submit your own payload, or browse more featured Key Croc Payloads.

 

 

Related Payloads

Blind OS Command Injection using Serial Number
Blind OS Command Injection using Serial Number
This payload allows a remote attacker to execute commands on a Linux system using the serial number as a vector to pass
Read More
Exfiltrate NTLM Hash To SD
Exfiltrate NTLM Hash To SD
This payload exfiltrates NTLM hash files to the Rubber Ducky's SD card for further analysis.
Read More
Same File Name Prank
Same File Name Prank
This payload renames files and folders to all have a similar name.
Read More