Skip to content

Commit

Permalink
Merge pull request #64 from 0i41E/master
Browse files Browse the repository at this point in the history
Username Change
  • Loading branch information
hak5peaks authored Jun 7, 2024
2 parents e930227 + 37efec3 commit 936469e
Show file tree
Hide file tree
Showing 5 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion payloads/library/credentials/KeyLogin/payload.txt
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
###############################KeyLogin#####################################
# Version 1.1
# OS: Windows
# Author: 0iphor13
# Author: 0i41E
# Discription: This extremely simple payload will lock the targets machine and will wait for it to insert the password.
# Afterwards these will be exfiltrated to your CloudC2 instance. The most covert technique to get clear text credentials!
#
Expand Down
6 changes: 3 additions & 3 deletions payloads/library/credentials/KeyLogin/readme.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
**Title: KeyLogin**

<p>Author: 0iphor13<br>
<p>Author: 0i41E<br>
OS: Windows<br>
Version: 1.1<br>
Requirements: CloudC2 Instance</p>
Expand All @@ -25,10 +25,10 @@ There you go, login credentials, exfiltrated in an automated manner, without the

KeyCroc will Notify you of the current attack state

![alt text](https://github.com/0iphor13/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/notifications.png)
![alt text](https://github.com/0i41E/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/notifications.png)

KeyCroc will save the inserted credentials into a seperate file for you
![alt text](https://github.com/0iphor13/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/loot.png)
![alt text](https://github.com/0i41E/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/loot.png)


Credit for support:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
##########################ReverseCroc#################################
# Version 1.0
# OS: Windows / Linux(?) (Not tested with Powershell on Linux)
# Author: 0iphor13
# Author: 0i41E

################Reverse shell executed in the background################
################Fill in Attacker-IP and Port in Line 19#################
Expand Down
2 changes: 1 addition & 1 deletion payloads/library/phishing/SpearPhishCroc/payload.txt
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
#######################################################SpearPhishCroc############################################################
# Version 1.0
# OS: Windows
# Author: 0iphor13
# Author: 0i41E
# Idea and code based on Invoke-CredentialsPhish from Nikhil Mittal
################Trigger a popup, demanding for valid credentials, popup can't be closed without valid credentials################
MATCH phishy
Expand Down
2 changes: 1 addition & 1 deletion payloads/library/remote_access/RemoteDeskCroc/payload.txt
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
###############################RemoteDeskCroc#####################################
# Version 1.0
# OS: Windows / Linux(?) (Not tested with Powershell on Linux)
# Author: 0iphor13
# Author: 0i41E
# Discription: This payload will give you screen access to your victims machine.
# Combined with KeyCrocs ability to type in commands, you have basically RemoteDesktop.
#
Expand Down

0 comments on commit 936469e

Please sign in to comment.