A script used to open an elevated powershell console and execute admin level commands. Completely ran from the execute file. Replace the URL in that file with yours leading to a base64 script This script will use IEX to download a base64 script to the $Payload variable. Using a keystroke injections attack a heavily obfuscated and encoded snippet will download and execute any base64 script saved in the $Payload variable. This payload completely bypasses the UAC and will run any admin level script without a prompt. You can use this function I wrote to convert your .ps1 scripts to Base64.
Execution is the method of either remotely or locally running code — malicious or otherwise — on a target computer. Execution is typically coupled with other techniques to carry out more complex tasks, like performing reconnaissance, exfiltration or credential harvesting. Execution may be ephemeral, or coupled with persistence techniques used to maintain remote access or continued code execution. See all execution payloads.
This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.