Partially avoids "PowerShell Script Block Logging". Closing of all windows. Hide "PowerShell" window. Abuse of "Windows Problem Steps Recorder" to spy on a user's activities. Writes the file system cache to disk. Safely eject.
Credential harvesting is the method of obtaining credentials — think usernames and passwords. Many techniques are used to obtain credentials, from keylogging to credential dumping. With a set of credentials in hand, red teamers may access systems and make lateral movement across the network, as well as creating their own credentials which may be difficult to detect in a breach. See all credential payloads.
This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.
Submit your own payload, or browse more featured Bash Bunny Payloads.
Get your payload in front of thousands. Enter to win over $2,000 in prizes in the Hak5 Payload Awards!
Submit entries to a payload repository by pull request. New to github? See this Hak5 tutorial video.
Get inspired, showcase your work and receive helpful feedback on your payloads in the Hak5 Community!
Third-party payloads executing as root may cause damage and come AS-IS without warranty or guarantees.
Payloads are for education and auditing where permitted subject to local and international laws. Users are solely responsible for compliance. Hak5 claims no responsibility for unauthorized or unlawful use.
255 featured payloads in this library. Hundreds more at GitHub.com/Hak5.
Sign up for sales, new releases, payloads and more...
We'll send you great deals and more
Get on the text list for even more!
Get the inside scoop on the latest releases, events, popular payloads and Hak5 Gear tips!
Thanks! Get on the text list for even more!
We will send you a notification as soon as this product is available again.
We don't share your email with anybody