Jump to content

Search the Community

Showing results for tags 'ideas'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 7 results

  1. This is some ideas I had for V1.0.3... 1) improve the recon mode, most of the time when scanning for ages it will only pickup 2 or 3 and sometimes don’t even show much details. I had 5 devices next to it which it did only pickup one. 2) Make it an option if you want to download a module to a USB maybe, say if you download a pop out asks if you want to save to another device if it detects another USB. 3) When you turn on dark mode it can sometimes make some of the recon tablets slots greyed out, when putting into the normal mode I see will the details with dark mode can be a bit
  2. Having recently bought the nano i often find myself looking at my mark v and thinking "what a sexy piece of kit" with its long ariels and huge power bank mmmm :) anyway lol what can i do with it now, what has everyone else done with theres, whats a good project to resurrect this thing of beauty :)
  3. Hey! I have had some pretty interesting ideas floating around in my head for a while. Some of them I don't have the know-how to write them and others I just get side-tracked or just have too many ideas in my head. Not to mention there are some ideas you just forget about because it leads you on to another idea which goes on to another and another and you just lose control over all your ideas. So I thought, well, we should have a pinned forum post for these ideas/concepts/theories. I think it would be a good idea to have a more community-based look at payload theories and concepts, as
  4. I've had this idea on my mind for a little while but the more i think about it the more it seems redundant just want a second opinion I want a small box thats small enough to fit in my bag and carry around with me, no markings or anything of that sort just a "black box" if you will. it runs linux with no GUI i wanna make it run Kali distro. and then from there just an SSH box to carry around with me. I mainly use Windows but having linux available seems good again the more i think of it the more redundant it seems. any comments? i wanna expand on it but mentally exhausted today
  5. With the HID drivers in the Bash Bunny, is there any way to read the status of the caps lock, num lock, and scroll lock keys? I ask because with a Teensy 3.2, the status of these keys can be read and it has some nice benefits for the type of HID attacks that can also be done with the Bunny. As in, I've programmed a Teensy to wait until the drivers are loaded before starting an HID attack. It does this by pressing num lock until it registers a status change. Another nice feature is that I have a way to send the Teensy feedback from Metasploit when a shell has been successfully created for
  6. HI Guys, This topic is not about a problem in bash bunny or something more than discussing future ideas to make the bash bunny more malicious. 1. What about installing Metasploit framework on the bunny and automatically launch it with aux/browser_autopwn with a proper payload and combining this scenario with captive_portal bunny payload, plug the bunny to a locked machine, the machine automatically launch the captive_portal which in fact is the browser_autopwn aux module link and take over the machine and the best part is "MACHINE IS LOCKED"! 2. If time is not relevant because this r
  7. Hey, I am out of ideas for scripts/infusions right know . So does anyone got an idea for a script/infusion? Thanks!
×
×
  • Create New...