Skip to content

sajithgairuka/Attiny85-Attacks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 

Repository files navigation

DISCLAIMER

2831777

This repository's software/scripts/applications/things are provided "as is," with no warranties of any kind. You use these software/scripts/applications/things at your own risk. The creator of these softwares/scripts/applications/things is not liable for any direct or indirect damage to your or someone else's property as a result of using these softwares/scripts/applications/things.

DigiSpark Attiny85 RubberDucky

Attiny85 based attacks

pctdetail 775-056 1

Environment Setup

I recommend going to digistump.com to learn how to set up a development environment for the Attiny85.

  • Attacker Machine { For Reverse Shell --> guide Link } : Kali Linux
  • Victime Machine : Windows 7 / windows 10

Bypass Techniques (Windows 10) 💀

winver

security

☠️ To bypass the security use "powershell -command invoke-item $env:UserProfile\desktop\wow.exe" instead "powershell -command i'n'vo'k'e-it'e'm $env:UserProfile\desktop\wow.exe" ☠️

Releases

No releases published

Packages

No packages published

Languages