diff --git a/payloads/library/remote_access/ReverseBunny/README.md b/payloads/library/remote_access/ReverseBunny/README.md index 5cd530b3..6a1b7f98 100644 --- a/payloads/library/remote_access/ReverseBunny/README.md +++ b/payloads/library/remote_access/ReverseBunny/README.md @@ -1,17 +1,13 @@ -**Title: ReverseBunny** +**Title: ReverseBunny** -Author: 0iphor13 - -Version: 1.3 +

Author: 0iphor13
+OS: Windows
+Version: 1.5

Getting remote access via obfuscated reverse shell.
+Upload payload.txt and RevBunny.ps1 onto your Bunny +![alt text](https://github.com/0iphor13/bashbunny-payloads/blob/master/payloads/library/remote_access/ReverseBunny/RevBunny.png) Change the variables in payload.txt to your attacking maschine & start your listener. (for example netcat: nc -lvnp [PORT] )

-Whats new in version 1.3? -- Changed the whole payload -- Added custom shell design - -Coming soon: -- Custom commands -- New evasion technique +A pressed CAPSLOCK button as also an indicator light on the bunny will indicate the payloads successfull execution