Revolver

Revolver
Download Copy
Title: Revolver
Author: saintcrossbow

This payload was made in the style of Q Branch: it provides multiple options for attack and getting out of bad situations. Switching into this payload will place the Bash Bunny in a command waiting mode. BLE beacons are sent to start attacks, including QuickCreds and nmap. A loot self-destruct option is also available. The payload is easily extendable to include any attack you might need in the field. Note other payloads were co-opted into this multimode attack, and to make it easy I used Hak5Darren's code, partially because I imagine he wants to see these payloads extended, and also because I know he appreciates Q Branch. Features • Once active, the Bash Bunny blinks a white LED indicating it is waiting for BLE beacons • Commands may be issued to start classic payloads (nmap, quickcreds), switch modes (USB storage or Ethernet), shutdown for removal, or initiate a loot self-destruct • After attacks are complete, Bash Bunny returns to a waiting state for more commands (except for self destruct and shut down)

This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.

Submit your own payload, or browse more featured Bash Bunny Payloads.

 

 

Related Payloads

Droidex
Droidex
Droidex exfiltrates the top file stored in the Downloads directory of target mobile device to a self-hosted python webse
Read More
edit2exfil
edit2exfil
edit2exfil is a persistent file exfiltration payload that embeds itself as a cronjob on Linux systems via bash script, r
Read More
PixelReflection
PixelReflection
This payload exfiltrates files by creating a 1 pixel sized form in the top left of the screen and changes the background
Read More