mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2026-02-14 23:18:52 +00:00
Added 2 Bash Bunny payloads: 1. NullSec-WiFi-Harvester (credentials/) - Extracts all saved WiFi passwords - Saves to loot with hostname prefix - Uses netsh for profile enumeration - ~8-10 second execution 2. NullSec-System-Recon (recon/) - Comprehensive system reconnaissance - OS, users, network, AV status - Saves detailed report to loot - ~15-20 second execution Both payloads: - Use HID + STORAGE attack modes - Include proper LED status indicators - Have complete readme documentation - Target Windows 10/11
790 B
790 B
NullSec System Recon 🔍
Comprehensive Windows system reconnaissance saved to Bash Bunny loot.
Description
Silently gathers detailed system information and saves to the Bash Bunny's loot folder:
- OS version and system specs
- Current user and domain info
- Local user accounts
- Network configuration (IP, gateway, DNS, MAC)
- Windows Defender/AV status
Requirements
- Windows 10/11
- PowerShell (default on Windows)
Status LEDs
| LED | Status |
|---|---|
| SETUP | Initializing attack modes |
| ATTACK | Running reconnaissance |
| FINISH | Complete, safe to unplug |
Output
Loot saved to: /root/udisk/loot/NullSec-System-Recon/<HOSTNAME>_recon.txt
Execution Time
~15-20 seconds
Author
- GitHub: bad-antics