Standard Phishing Payload Using kdialog - Linux

Standard Phishing Payload Using kdialog - Linux
Download Copy
Title: Standard Phishing Payload Using kdialog - Linux
Author: Aleff

A script used to exfiltrate some input by a popup phishing based on linux systems using kdialog. Opens a shell, get the data by a popup, send the input to a Discord webhook (or whatever you want to use for the exfiltration).

Phishing is a popular technique for gaining access to a target. Generally, phishing is a digitally delivered social engineering method. Phishing techniques may use a wide net, or specifically target one role or individual — known as spearphishing. Many phishing campaigns involve tricking a target into divulging confidential information, such as by mimicking a known-trusted source — be it a website or person. See all phishing payloads.

This payload is for the USB Rubber Ducky — a "flash drive" that types keystroke injection payloads into unsuspecting computers at incredible speeds. It's no wonder this little quacker has made appearances on Mr. Robot, FBI, Blacklist, National Geography and more!

Submit your own payload, or browse more featured USB Rubber Ducky Payloads.

 

 

Related Payloads

Strip Connected Clients
Strip Connected Clients
Pulls previously connected clients from the recon database and stores that list in a file located in /root/loot/info.
Read More
Strip Open AP
Strip Open AP
Strips open access points from the recon database and stores that list in a file located in /root/loot/pools.
Read More
SSID Chaos
SSID Chaos
SSID Chaos Engine is a themed SSID broadcast generator designed to weaponize curiosity, paranoia, humor, and confusion—p
Read More