||Redirects and spoofs all DNS requests to the Bash Bunny, and serves a configurable captive portal. All captured credentials will be logged in the payload's folder in a file named *capture.log*.
||Snags credentials from locked or unlocked machines
Based on the attack by Mubix of Room362.com
Implements a responder attack. Saves creds to the loot folder on the USB Disk
Looks for *NTLM* log files
||Scans target with nmap using specified options
Saves sequential logs to mass storage loot folder
||Checks whether RDP is enabled on target machine
||Moves tools from the tools_to_install/ USB disk to /pentest on the Bash Bunny
||Exfiltrates files from the users Documents folder
||Copies an executable (or executable in a directory) from the Bash Bunny USB Mass Storage
||Adds support for new languages. and uses the Ducktoolkit python library for encoding.
||Boilerplate for running Ducky Code on a Bash Bunny
||A payload that grabs the chrome cookies sqlite3 file and also any spreadsheets in
the Documents folder and places them inside a folder on the BashBunny called MacLoot.
||Based on PoisonTap created by @SamyKamkar
||Mounts as storage and acts as HID. Backup a list of files to the BashBunny
||Dumps saved Wi-Fi infos including clear text passwords to the bash bunny
||Turns back the clock to a k-rad ultra ereet 1990's VGA resolution Executes p.ps1 from the selected switch folder of the Bash Bunny USB Disk partition.
||Clones the bashbunny-payloads repository and also will update an existing repository. Use this payload to get all the other payloads!
||opens a python reverse shell to the IP and PORT of your choosing. Also, as a nice little bonus, it runs the DYLD exploit that, if vulnerable will give you a root shell
||Executes a netcat reverse cmd shell at a given IP and Port
||Executes a VBScript, concealed in a hidden PowerShell window