diff --git a/payloads/library/credentials/KeyLogin/payload.txt b/payloads/library/credentials/KeyLogin/payload.txt
index 22887ec..3596822 100644
--- a/payloads/library/credentials/KeyLogin/payload.txt
+++ b/payloads/library/credentials/KeyLogin/payload.txt
@@ -1,7 +1,7 @@
###############################KeyLogin#####################################
# Version 1.1
# OS: Windows
-# Author: 0iphor13
+# Author: 0i41E
# Discription: This extremely simple payload will lock the targets machine and will wait for it to insert the password.
# Afterwards these will be exfiltrated to your CloudC2 instance. The most covert technique to get clear text credentials!
#
diff --git a/payloads/library/credentials/KeyLogin/readme.md b/payloads/library/credentials/KeyLogin/readme.md
index 4c9d6f1..ab42008 100644
--- a/payloads/library/credentials/KeyLogin/readme.md
+++ b/payloads/library/credentials/KeyLogin/readme.md
@@ -1,6 +1,6 @@
**Title: KeyLogin**
-
Author: 0iphor13
+
Author: 0i41E
OS: Windows
Version: 1.1
Requirements: CloudC2 Instance
@@ -25,10 +25,10 @@ There you go, login credentials, exfiltrated in an automated manner, without the
KeyCroc will Notify you of the current attack state
-![alt text](https://github.com/0iphor13/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/notifications.png)
+![alt text](https://github.com/0i41E/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/notifications.png)
KeyCroc will save the inserted credentials into a seperate file for you
-![alt text](https://github.com/0iphor13/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/loot.png)
+![alt text](https://github.com/0i41E/keycroc-payloads/blob/master/payloads/library/credentials/KeyLogin/loot.png)
Credit for support:
diff --git a/payloads/library/exploit/WIN_ReverseCroc/WIN_ReverseCroc.txt b/payloads/library/exploit/WIN_ReverseCroc/WIN_ReverseCroc.txt
index 8ec3fd3..09e73ec 100644
--- a/payloads/library/exploit/WIN_ReverseCroc/WIN_ReverseCroc.txt
+++ b/payloads/library/exploit/WIN_ReverseCroc/WIN_ReverseCroc.txt
@@ -1,7 +1,7 @@
##########################ReverseCroc#################################
# Version 1.0
# OS: Windows / Linux(?) (Not tested with Powershell on Linux)
-# Author: 0iphor13
+# Author: 0i41E
################Reverse shell executed in the background################
################Fill in Attacker-IP and Port in Line 19#################
diff --git a/payloads/library/phishing/SpearPhishCroc/payload.txt b/payloads/library/phishing/SpearPhishCroc/payload.txt
index 94592a3..290c13f 100644
--- a/payloads/library/phishing/SpearPhishCroc/payload.txt
+++ b/payloads/library/phishing/SpearPhishCroc/payload.txt
@@ -1,7 +1,7 @@
#######################################################SpearPhishCroc############################################################
# Version 1.0
# OS: Windows
-# Author: 0iphor13
+# Author: 0i41E
# Idea and code based on Invoke-CredentialsPhish from Nikhil Mittal
################Trigger a popup, demanding for valid credentials, popup can't be closed without valid credentials################
MATCH phishy
diff --git a/payloads/library/remote_access/RemoteDeskCroc/payload.txt b/payloads/library/remote_access/RemoteDeskCroc/payload.txt
index c23bbcf..6b91891 100644
--- a/payloads/library/remote_access/RemoteDeskCroc/payload.txt
+++ b/payloads/library/remote_access/RemoteDeskCroc/payload.txt
@@ -1,7 +1,7 @@
###############################RemoteDeskCroc#####################################
# Version 1.0
# OS: Windows / Linux(?) (Not tested with Powershell on Linux)
-# Author: 0iphor13
+# Author: 0i41E
# Discription: This payload will give you screen access to your victims machine.
# Combined with KeyCrocs ability to type in commands, you have basically RemoteDesktop.
#