diff --git a/payloads/library/credentials/KeyLogin/payload.txt b/payloads/library/credentials/KeyLogin/payload.txt index 22887ec..3596822 100644 --- a/payloads/library/credentials/KeyLogin/payload.txt +++ b/payloads/library/credentials/KeyLogin/payload.txt @@ -1,7 +1,7 @@ ###############################KeyLogin##################################### # Version 1.1 # OS: Windows -# Author: 0iphor13 +# Author: 0i41E # Discription: This extremely simple payload will lock the targets machine and will wait for it to insert the password. # Afterwards these will be exfiltrated to your CloudC2 instance. The most covert technique to get clear text credentials! # diff --git a/payloads/library/credentials/KeyLogin/readme.md b/payloads/library/credentials/KeyLogin/readme.md index 4c9d6f1..ab42008 100644 --- a/payloads/library/credentials/KeyLogin/readme.md +++ b/payloads/library/credentials/KeyLogin/readme.md @@ -1,6 +1,6 @@ **Title: KeyLogin** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 1.1
Requirements: CloudC2 Instance

@@ -25,10 +25,10 @@ There you go, login credentials, exfiltrated in an automated manner, without the KeyCroc will Notify you of the current attack state -![alt text](https://github.com/0iphor13/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/notifications.png) +![alt text](https://github.com/0i41E/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/notifications.png) KeyCroc will save the inserted credentials into a seperate file for you -![alt text](https://github.com/0iphor13/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/loot.png) +![alt text](https://github.com/0i41E/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/loot.png) Credit for support: diff --git a/payloads/library/exploit/WIN_ReverseCroc/WIN_ReverseCroc.txt b/payloads/library/exploit/WIN_ReverseCroc/WIN_ReverseCroc.txt index 8ec3fd3..09e73ec 100644 --- a/payloads/library/exploit/WIN_ReverseCroc/WIN_ReverseCroc.txt +++ b/payloads/library/exploit/WIN_ReverseCroc/WIN_ReverseCroc.txt @@ -1,7 +1,7 @@ ##########################ReverseCroc################################# # Version 1.0 # OS: Windows / Linux(?) (Not tested with Powershell on Linux) -# Author: 0iphor13 +# Author: 0i41E ################Reverse shell executed in the background################ ################Fill in Attacker-IP and Port in Line 19################# diff --git a/payloads/library/phishing/SpearPhishCroc/payload.txt b/payloads/library/phishing/SpearPhishCroc/payload.txt index 94592a3..290c13f 100644 --- a/payloads/library/phishing/SpearPhishCroc/payload.txt +++ b/payloads/library/phishing/SpearPhishCroc/payload.txt @@ -1,7 +1,7 @@ #######################################################SpearPhishCroc############################################################ # Version 1.0 # OS: Windows -# Author: 0iphor13 +# Author: 0i41E # Idea and code based on Invoke-CredentialsPhish from Nikhil Mittal ################Trigger a popup, demanding for valid credentials, popup can't be closed without valid credentials################ MATCH phishy diff --git a/payloads/library/remote_access/RemoteDeskCroc/payload.txt b/payloads/library/remote_access/RemoteDeskCroc/payload.txt index c23bbcf..6b91891 100644 --- a/payloads/library/remote_access/RemoteDeskCroc/payload.txt +++ b/payloads/library/remote_access/RemoteDeskCroc/payload.txt @@ -1,7 +1,7 @@ ###############################RemoteDeskCroc##################################### # Version 1.0 # OS: Windows / Linux(?) (Not tested with Powershell on Linux) -# Author: 0iphor13 +# Author: 0i41E # Discription: This payload will give you screen access to your victims machine. # Combined with KeyCrocs ability to type in commands, you have basically RemoteDesktop. #