Win_SSLKeyLog

Win_SSLKeyLog
Download Copy
Title: Win_SSLKeyLog
Author: TW-D

Captures the client network session. Captures the client side session keys. Partially avoids "PowerShell Script Block Logging". Closing of all windows. Hide "PowerShell" window. Check if current process have "Administrator" privilege. Sets the "SSLKEYLOGFILE" environment variable to store SSL session key information. Starts a "Network Tracing Session" with "ETW (Event Tracing for Windows)". Writes the file system cache to disk. Safely eject.

Credential harvesting is the method of obtaining credentials — think usernames and passwords. Many techniques are used to obtain credentials, from keylogging to credential dumping. With a set of credentials in hand, red teamers may access systems and make lateral movement across the network, as well as creating their own credentials which may be difficult to detect in a breach. See all credential payloads.

This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.

Submit your own payload, or browse more featured Bash Bunny Payloads.

 

 

Related Payloads

PlunderPIN
PlunderPIN
PlunderPIN is a mobile PIN phishing payload that replaces a user's Google Chrome browser homepage with a malicious imita
Read More
capture http credentials
capture http credentials
This payload uses inotifywait and DYNAMICPROXY to monitor the HTTP POST data streams generated by a client and extract s
Read More
WAR GAMES
WAR GAMES
A text adventure game inspired by the 1983 film WarGames. Set in December 2025, you play as James Lightman, son of the l
Read More