Skip to content
/ pwnKit Public

pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.

Notifications You must be signed in to change notification settings

drapl0n/pwnKit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

pwnKit

About:

  • Title: pwnKit
  • Description: Privilege escalation in Unix-like operating systems
  • AUTHOR: drapl0n
  • Version: 1.0
  • Category: Privilege Escalation
  • Target: Unix-like operating systems
  • Attackmodes: HID

pwnKit is Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.

Variation's:

  1. Online: payload.txt(requires internet connection on victims machine).
  2. Offline: payload2.txt(don't require internet connection on victims machine).

Workflow:

  1. Stop storing history, this helps to keep tracks clear from begining.
  2. Creating temporary folder for storing exploit code and compiling it.
  3. Importing, compiling and executing exploit.
  4. Spawning root shell.
  5. Deleting exploit code and clearing tracks.

Support me if you like my work:

About

pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published