AydroidDev / dawnKit

DawnKit is Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

DawnKit

About:

  • Title: DawnKit
  • Description: Privilege escalation in Unix-like operating systems
  • AUTHOR: drapl0n
  • Version: 1.0
  • Category: Privilege Escalation
  • Target: Unix-like operating systems
  • Attackmodes: HID

DawnKit is Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.

Workflow:

  1. Stop storing history, this helps to keep tracks clear from begining.
  2. Creating temporary folder for storing exploit code and compiling it.
  3. Importing, compiling and executing exploit.
  4. Spawning root shell.
  5. Deleting exploit code and clearing tracks.

Support me if you like my work:

About

DawnKit is Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.