Shortcut-Jacker

Shortcut-Jacker
Download Copy
Title: Shortcut-Jacker
Author: I am Jakoby

This payload will run a powershell script in the background of any shortcut used on the targets desktop

🏆   Recognized with a Payload Award in September 2023

 

Execution is the method of either remotely or locally running code — malicious or otherwise — on a target computer. Execution is typically coupled with other techniques to carry out more complex tasks, like performing reconnaissance, exfiltration or credential harvesting. Execution may be ephemeral, or coupled with persistence techniques used to maintain remote access or continued code execution. See all execution payloads.

This payload is for the USB Rubber Ducky — a "flash drive" that types keystroke injection payloads into unsuspecting computers at incredible speeds. It's no wonder this little quacker has made appearances on Mr. Robot, FBI, Blacklist, National Geography and more!

Submit your own payload, or browse more featured USB Rubber Ducky Payloads.

 

 

Related Payloads

Exfiltrate NTLM Hash To SD
Exfiltrate NTLM Hash To SD
This payload exfiltrates NTLM hash files to the Rubber Ducky's SD card for further analysis.
Read More
Same File Name Prank
Same File Name Prank
This payload renames files and folders to all have a similar name.
Read More
Exfiltrate NTLM Hash
Exfiltrate NTLM Hash
A payload used to exfiltrate the NTLM hash on a Windows machine.
Read More