Bouncy Coil

Bouncy Coil

by Cribbit August 16, 2024

General OMG

This payload uses Powershell to create a O.MG Coil that bounces around the screen.
A.S.E - Advanced System Exfiltration

A.S.E - Advanced System Exfiltration

by LulzAnarchyAnon August 16, 2024

Exfiltration OMG

This slow, and steady staged payload takes it's time and gleans detailed system information using Powershell, Ducky script and notepad.

run command as root without sudo password

run command as root without sudo password

by simen64 August 16, 2024

Execution OMG

A payload that allows for executing any bash command on the targets computer as root, without knowing their sudo password.
Windows Screenshot Exfil

Windows Screenshot Exfil

by thomasboegl1 August 06, 2024

Exfiltration USB Rubber Ducky

This payload captures screenshots from a Windows machine every 10 seconds and uploads them to a specified server using the Powershell.

DNS TXT Command Injection

DNS TXT Command Injection

by nathansb2022 August 06, 2024

Execution USB Rubber Ducky

This payload uses Resolve-DnsName to perform a DNS name query resolution for a domain hosting a malicious TXT record
AirBridge

AirBridge

by 0i41E July 30, 2024

General Packet Squirrel

AirBridge is a payload designed for the Packet Squirrel MK II in combination with Hak5's MK7AC Module, or similar WiFi adapters. It is meant to help users to...

Duckie Harvest

Duckie Harvest

by nic005-arch July 24, 2024

Credentials USB Rubber Ducky

This payload extracts and saves Wi-Fi passwords and browser credentials from Google Chrome, Brave, Firefox, and Microsoft Edge on the target machine. Additio...
Linux Mac Reverse shell

Linux Mac Reverse shell

by sridharas04 July 23, 2024

Bash Bunny Remote Access

This payload runs a script in the background that provides a user shell initially and waits for the user to escalate privileges, then provides a root reverse...

WiFi Passwords Exfiltration Via SCP

WiFi Passwords Exfiltration Via SCP

by F1ll0ry July 23, 2024

Exfiltration USB Rubber Ducky

This payload finds WiFi SSIDs and passwords on a Windows machine, saves them to a file, and sends the file to a VPS using SCP.
Linux Blind Serial Command Injection

Linux Blind Serial Command Injection

by TW-D July 17, 2024

Key Croc Remote Access

Allows a remote attacker to execute commands on a Linux system via a serial connection, without receiving feedback on the results of the commands.

Lazagne Exfil

Lazagne Exfil

by mrproxy July 11, 2024

Exfiltration USB Rubber Ducky

This payload downloads and runs Lazagne, stores all info to .txt file, sends file to telegram bot.
Google Exfil

Google Exfil

by mrproxy July 11, 2024

Exfiltration USB Rubber Ducky

This payload runs Powershell script that zips google user data, uses gofile.io api to upload it, and then sends a download link through telegram bot or disco...

Defend Yourself From CVE-2023-23397

Defend Yourself From CVE-2023-23397

by Aleff July 09, 2024

Incident Response USB Rubber Ducky

This script sets a Firewall rule that will defend you against CVE-2023-23397.
The Perfect Stealthy Payload

The Perfect Stealthy Payload

by F1ll0ry July 09, 2024

General USB Rubber Ducky

Opens PowerShell as admin, creates a folder in Windows/temp called Cache, adds exclusion in Defender, downloads the payload from VPS/ inside the Cache folder...

Nmap w Discord & C2 Exfil

Nmap w Discord & C2 Exfil

by InfoSecREDD July 03, 2024

Recon Shark Jack

This script scans the local subnet with Nmap for any online devices. While also logging the Public IP of the Victim's Network. Also including CloudC2 and Di...
Windows Duck In The Middle

Windows Duck In The Middle

by PlumpyTurkey June 26, 2024

Exfiltration USB Rubber Ducky

This payload sets up a trustworthy proxy for the user, enabling a Man-in-the-middle attack. After executing your payload, the proxy server will intercept all...

Windows Product Key Grabber

Windows Product Key Grabber

by PlumpyTurkey June 26, 2024

Exfiltration USB Rubber Ducky

This payload sends you the target PC's Windows product key via Dropbox.
Linux Keystroke Reflection

Linux Keystroke Reflection

by TW-D June 24, 2024

Exfiltration Key Croc

Implementation of the "Keystroke Reflection" technique for file exfiltration.


1 2 3 32 Next