mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-12-20 03:58:25 +00:00
Update README.md
This commit is contained in:
@@ -1,17 +1,13 @@
|
||||
**Title: ReverseBunny**
|
||||
**Title: ReverseBunny**
|
||||
|
||||
Author: 0iphor13
|
||||
|
||||
Version: 1.3
|
||||
<p>Author: 0iphor13<br>
|
||||
OS: Windows<br>
|
||||
Version: 1.5<br>
|
||||
|
||||
|
||||
<p>Getting remote access via obfuscated reverse shell.<br>
|
||||
Upload payload.txt and RevBunny.ps1 onto your Bunny
|
||||

|
||||
Change the variables in payload.txt to your attacking maschine & start your listener. (for example netcat: nc -lvnp [PORT] )</p>
|
||||
|
||||
Whats new in version 1.3?
|
||||
- Changed the whole payload
|
||||
- Added custom shell design
|
||||
|
||||
Coming soon:
|
||||
- Custom commands
|
||||
- New evasion technique
|
||||
A pressed CAPSLOCK button as also an indicator light on the bunny will indicate the payloads successfull execution
|
||||
|
||||
Reference in New Issue
Block a user