by Aleff July 09, 2024
Incident Response USB Rubber Ducky
This script sets a Firewall rule that will defend you against CVE-2023-23397.
by Aleff January 17, 2023
Incident Response OMG
This script allows you to set the Register Key block rule that will allow you to defend against CVE-2023-36884.
by Aleff January 17, 2023
Incident Response USB Rubber Ducky
This payload sends an HTTP request to a remote server using the curl command. If the request succeeds, it means the exploit was successful. Conversely, if th...
by Aleff January 17, 2023
Incident Response USB Rubber Ducky
This script allows you to set the Register Key block rule that will allow you to defend against CVE-2023-36884.
by Aleff January 17, 2023
Incident Response USB Rubber Ducky
Use this script to set up an automated integrity verification system for your Cisco IOS XE machine in relation to the attack that could create a backdoor on ...
by moosehadley May 19, 2022
Incident Response USB Rubber Ducky
GoodUSB is a script that downloads ClamAV, updates it, and scans your system memory for malware and terminates any processes it finds.
by I am Jakoby May 10, 2022
Incident Response USB Rubber Ducky
This program is meant to locate your devices. When someone plugs it into their computer a one liner in the run box a script will be downloaded and executed t...
by I am Jakoby May 10, 2022
Incident Response OMG
A script I put together to locate your stolen devices, or your stolen baited devices. This program is meant to locate your devices. Save the execution file o...
by I am Jakoby April 29, 2022
Incident Response OMG
A script I put together to locate your stolen devices, or your *stolen* baited devices. This program is meant to locate your devices. Save the execution file...
by Paul Murton October 05, 2021
Bash Bunny Incident Response
In an incident where a user is suspected of exfiltrating data to a USB storage device, CD/DVD etc, its possible that the user may subsequently open an exfilt...
by Paul Murton October 05, 2021
Bash Bunny Incident Response
A (naive) user may attempt to hide image(picture) files by simply renaming them to appear to be other filetypes (i.e. Word documents etc). This payload uses ...