Skip to content

jblackiex/history_usb_payload

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

history_usb_payload

🛠️ How it works

-- > This payload is designed to exfiltrate the public IP address and bash history to a Discord Webhook Server. You will need a rubber-ducky or Raspberry Pi Pico to test the script.

It starts by opening a shell, sending the target machine's public IP address to a Discord WebHook. Then, it creates a bash script, which is executed in the background mode using the & symbol. The script continuously sends history commands to the same Discord webhook, one line at a time, indefinitely (or until detected). This is a straightforward project aimed at enhancing a little bit my understanding of payloads and cybersecurity in general. Currently, it is compatible only with Linux devices using US or UK keyboard layouts.

Italian keyboard layout is coming soon..

Disclamer

This script has been created purely for educational purposes and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.

About

My Own ---> Bash script Payload for a Bad-usb

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published