UrAttaControl

UrAttaControl
Download Copy
Title: UrAttaControl
Author: I am Jakoby

A script used to open an elevated powershell console and execute admin level commands. Completely ran from the execute file. Replace the URL in that file with yours leading to a base64 script This script will use IEX to download a base64 script to the $Payload variable. Using a keystroke injections attack a heavily obfuscated and encoded snippet will download and execute any base64 script saved in the $Payload variable. This payload completely bypasses the UAC and will run any admin level script without a prompt. You can use this function I wrote to convert your .ps1 scripts to Base64.

Execution is the method of either remotely or locally running code — malicious or otherwise — on a target computer. Execution is typically coupled with other techniques to carry out more complex tasks, like performing reconnaissance, exfiltration or credential harvesting. Execution may be ephemeral, or coupled with persistence techniques used to maintain remote access or continued code execution. See all execution payloads.

This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.

Submit your own payload, or browse more featured Bash Bunny Payloads.

 

 

Related Payloads

Follow someone on Instagram
Follow someone on Instagram
This script can be used play a prank on friends by having them follow an Instagram account. Open a PowerShell, start a
Read More
Send Messages In Discord Channel-Server
Send Messages In Discord Channel-Server
This script can be used to send messages in a specific channel of a Discord text server. Open the GUI interface and tro
Read More
Tree Structure Of The Operating System
Tree Structure Of The Operating System
This script allows the exfiltration of the structure of the files contained in a machine, through the use of the tree co
Read More