Skip to content

Windows persistence injection using custom reflective DLL injection malware.

Notifications You must be signed in to change notification settings

kirtcathey/BashBunny-WinPersist

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

BashBunny-WinPersist

Windows persistence injection using custom reflective DLL injection malware.

Kirt Cathey nor SysRisk take any responsibility for what may become of these files. Use at your own peril and know what you are doing before implementing. Payload.txt is the BashBunny script that call foxme.ps1 and stores the persistence files. FireService.vbs is the persistence file that is loaded into the Startup folder to gain persistence.

Look for square brackets [] and input your filename, destination IP, and destination port there. You can also use netcat and the scripts are commented out in these files, since netcat is generally detected by AV these days.

This was developed using a Japanese system and a Japanese keyboard, so pay attention to the locale settings in the powershell and apply your own locale or remove those commands if you use and en-US keyboard and your system is set to that locale for keyboard input.

About

Windows persistence injection using custom reflective DLL injection malware.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published