Community developed payloads for Hak5 gear are featured and awarded at PayloadHub — a growing library of currated content.
Unleash your hacking creativity with the online payload editor: PayloadStudio
Link to your collections, sales and even external links
Add up to five columns
Community developed payloads for Hak5 gear are featured and awarded at PayloadHub — a growing library of currated content.
Unleash your hacking creativity with the online payload editor: PayloadStudio
Link to your collections, sales and even external links
Add up to five columns
This is a Three stage payload that begins by opening bluetooth file transfer on the target device. Next the attackers bluetooth adapter name is selected for pairing. In the second stage the last folder opened is selected followed by all of the files in the folder being selected, and added to the transfer cue. The Third, and final stage authenticates, and allows pairing between the attacker, and the target device. Afterwards the selected files are transferred to the attackers device via bluetooth. I selected the pictures/camera roll folder as a default for this payload, but it can be changed. Depending on both devices certain variables will need to be adjusted in order for this payload to run correctly. At the beginning of the Second stage "k" is for kali (adapter name) as it is the attacker device used for payload. NOTE: Make sure your device is Discoverable... The cursor coordinates x,y on the screen may vary depending on device... A Pairing request will pop up, hit CONFIRM... A Pairing accept will pop up, hit CONFIRM
Execution is the method of either remotely or locally running code — malicious or otherwise — on a target computer. Execution is typically coupled with other techniques to carry out more complex tasks, like performing reconnaissance, exfiltration or credential harvesting. Execution may be ephemeral, or coupled with persistence techniques used to maintain remote access or continued code execution. See all execution payloads.
This payload is for OMG — a platform built for covert field-use with features that enhance remote execution, stealth and forensics evasion, all while being able to quickly change your tooling on the fly.
Submit your own payload, or browse more featured OMG Payloads.
Get your payload in front of thousands. Enter to win over $2,000 in prizes in the Hak5 Payload Awards!
Submit entries to a payload repository by pull request. New to github? See this Hak5 tutorial video.
Get inspired, showcase your work and receive helpful feedback on your payloads in the Hak5 Community!
Third-party payloads executing as root may cause damage and come AS-IS without warranty or guarantees.
Payloads are for education and auditing where permitted subject to local and international laws. Users are solely responsible for compliance. Hak5 claims no responsibility for unauthorized or unlawful use.
397 featured payloads in this library. Hundreds more at GitHub.com/Hak5.