swap_jack

swap_jack
Download Copy
Title: swap_jack
Author: drapl0n

swap_jack, simple yet powerful payload which can be used to replace one command with another on target's system.

Execution is the method of either remotely or locally running code — malicious or otherwise — on a target computer. Execution is typically coupled with other techniques to carry out more complex tasks, like performing reconnaissance, exfiltration or credential harvesting. Execution may be ephemeral, or coupled with persistence techniques used to maintain remote access or continued code execution. See all execution payloads.

This payload is for OMG — a platform built for covert field-use with features that enhance remote execution, stealth and forensics evasion, all while being able to quickly change your tooling on the fly.

Submit your own payload, or browse more featured OMG Payloads.

 

 

Related Payloads

Exfiltrate NTLM Hash To SD
Exfiltrate NTLM Hash To SD
This payload exfiltrates NTLM hash files to the Rubber Ducky's SD card for further analysis.
Read More
Same File Name Prank
Same File Name Prank
This payload renames files and folders to all have a similar name.
Read More
Exfiltrate NTLM Hash
Exfiltrate NTLM Hash
A payload used to exfiltrate the NTLM hash on a Windows machine.
Read More