From 1bb43203e745dd16e29ab93702f4e96c265b09ee Mon Sep 17 00:00:00 2001
From: 0i41E <79219148+0i41E@users.noreply.github.com>
Date: Tue, 28 May 2024 19:28:14 +0200
Subject: [PATCH] Username Change
---
payloads/library/credentials/SamDumpCable/README.md | 4 ++--
payloads/library/credentials/SamDumpCable/payload.txt | 2 +-
payloads/library/execution/Ai-Cable | 2 +-
payloads/library/execution/FodCable - UAC Bypass/README.md | 2 +-
payloads/library/execution/FodCable2 - UAC Bypass/README.md | 2 +-
.../library/execution/FodCable2 - UAC Bypass/payload.txt | 2 +-
.../execution/Windows11_CommandPrompt_Downgrade/README.md | 2 +-
.../execution/Windows11_CommandPrompt_Downgrade/payload.txt | 2 +-
payloads/library/general/OMG-AwarenessTraining | 2 +-
payloads/library/general/Setup-Automation | 2 +-
payloads/library/prank/-OMG-AcidBurn/README.md | 2 +-
payloads/library/prank/-OMG-JumpScare/README.md | 2 +-
payloads/library/remote_access/OMGHoax/payload.txt | 2 +-
.../library/remote_access/PingZhellCable/PingZhellClient.pl | 2 +-
payloads/library/remote_access/PingZhellCable/README.md | 4 ++--
payloads/library/remote_access/PingZhellCable/payload.txt | 2 +-
payloads/library/remote_access/RemoteDeskCable/README.md | 6 +++---
payloads/library/remote_access/RemoteDeskCable/payload.txt | 2 +-
payloads/library/remote_access/ReverseCable II/payload.txt | 2 +-
payloads/library/remote_access/ReverseCable/payload.txt | 2 +-
payloads/library/remote_access/ReverseCableSSL/README.md | 6 +++---
payloads/library/remote_access/ReverseCableSSL/payload.txt | 2 +-
22 files changed, 28 insertions(+), 28 deletions(-)
diff --git a/payloads/library/credentials/SamDumpCable/README.md b/payloads/library/credentials/SamDumpCable/README.md
index 2575429..8a0d086 100644
--- a/payloads/library/credentials/SamDumpCable/README.md
+++ b/payloads/library/credentials/SamDumpCable/README.md
@@ -1,6 +1,6 @@
**Title: SamDumpCable**
-
Author: 0iphor13
+
Author: 0i41E
OS: Windows
Version: 1.0
Requirements: OMG Firmware v.2.5 or higher
@@ -23,4 +23,4 @@ Afterwards you can use a tool like samdump2 to extract the users hashes.
**!Disclaimer! samdump2 has proven to be unreliable in the recent past.**
-![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png)
+![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png)
diff --git a/payloads/library/credentials/SamDumpCable/payload.txt b/payloads/library/credentials/SamDumpCable/payload.txt
index 458f4a2..fc64373 100644
--- a/payloads/library/credentials/SamDumpCable/payload.txt
+++ b/payloads/library/credentials/SamDumpCable/payload.txt
@@ -1,6 +1,6 @@
REM Title: SamDumpCable
REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like samdump2, to get the users hashes.
-REM Author: 0iphor13
+REM Author: 0i41E
REM Version: 1.0
REM Category: Credentials
REM Requirements: OMG Firmware v.2.5 or higher
diff --git a/payloads/library/execution/Ai-Cable b/payloads/library/execution/Ai-Cable
index 471b3c5..ac930cd 100644
--- a/payloads/library/execution/Ai-Cable
+++ b/payloads/library/execution/Ai-Cable
@@ -1,7 +1,7 @@
REM Ai-Cable
REM Version 2.0
REM OS: MULTI (Tested with the OMG-Plug on Google Chrome/Windows 10 at screen resolution 1920 x 1080)
-REM Author: 0iphor13
+REM Author: 0i41E
REM This payload will write its own payload, until you kill it! Maybe, if you wait long enough, it will create a payload of the month...
REM Click run and let it happen, don't move! Might not work properly on every system due to timings, screen resolution, etc...
diff --git a/payloads/library/execution/FodCable - UAC Bypass/README.md b/payloads/library/execution/FodCable - UAC Bypass/README.md
index 2a7f5ce..a5fc88b 100644
--- a/payloads/library/execution/FodCable - UAC Bypass/README.md
+++ b/payloads/library/execution/FodCable - UAC Bypass/README.md
@@ -1,6 +1,6 @@
**Title: FodCable - UAC Bypass**
-Author: 0iphor13
+Author: 0i41E
Version: 1.0
diff --git a/payloads/library/execution/FodCable2 - UAC Bypass/README.md b/payloads/library/execution/FodCable2 - UAC Bypass/README.md
index 407f5d3..b24f165 100644
--- a/payloads/library/execution/FodCable2 - UAC Bypass/README.md
+++ b/payloads/library/execution/FodCable2 - UAC Bypass/README.md
@@ -1,6 +1,6 @@
**Title: FodCableII - UAC Bypass**
-Author: 0iphor13
+
Author: 0i41E
Version: 1.0
Requirements: OMG Firmware v.2.5 or higher
diff --git a/payloads/library/execution/FodCable2 - UAC Bypass/payload.txt b/payloads/library/execution/FodCable2 - UAC Bypass/payload.txt
index 4c6dc86..dea6f98 100644
--- a/payloads/library/execution/FodCable2 - UAC Bypass/payload.txt
+++ b/payloads/library/execution/FodCable2 - UAC Bypass/payload.txt
@@ -1,7 +1,7 @@
REM FodCableII
REM Version 1.0
REM OS: Windows
-REM Author: 0iphor13
+REM Author: 0i41E
REM Requirements: OMG Firmware v.2.5 or higher
REM Using FodHelper.exe to bypass UAC and get an elevated shell
diff --git a/payloads/library/execution/Windows11_CommandPrompt_Downgrade/README.md b/payloads/library/execution/Windows11_CommandPrompt_Downgrade/README.md
index 6281a8a..8878745 100644
--- a/payloads/library/execution/Windows11_CommandPrompt_Downgrade/README.md
+++ b/payloads/library/execution/Windows11_CommandPrompt_Downgrade/README.md
@@ -1,6 +1,6 @@
**Title: Windows11_CommandPrompt_Downgrade**
-Author: 0iphor13
+
Author: 0i41E
OS: Windows11
Version: 1.0
diff --git a/payloads/library/execution/Windows11_CommandPrompt_Downgrade/payload.txt b/payloads/library/execution/Windows11_CommandPrompt_Downgrade/payload.txt
index 5f6eac2..62ca90b 100644
--- a/payloads/library/execution/Windows11_CommandPrompt_Downgrade/payload.txt
+++ b/payloads/library/execution/Windows11_CommandPrompt_Downgrade/payload.txt
@@ -1,7 +1,7 @@
REM Windows11_CommandPrompt_Downgrade
REM Version 1.0
REM OS: Windows11
-REM Author: 0iphor13
+REM Author: 0i41E
REM Requirements: OMG Firmware v.3.0 or higher
REM Changing the Command Prompt to Conhost, to enable hidden Powershell for certain W11 Builds.
REM Other Methods values are also provided for backup or simply playing around.
diff --git a/payloads/library/general/OMG-AwarenessTraining b/payloads/library/general/OMG-AwarenessTraining
index 1ef37b2..82cb7c0 100644
--- a/payloads/library/general/OMG-AwarenessTraining
+++ b/payloads/library/general/OMG-AwarenessTraining
@@ -1,7 +1,7 @@
REM OMG-AwarenessTraining
REM Version 1.1
REM OS: Windows
-REM Author: 0iphor13
+REM Author: 0i41E
REM A small message box, telling the user that he violated the security policy. The hostname of the user will be send to a webhook to report the incident
REM Fill in the (Web)hook URL, in LINE 31, where the hostname should be reported to.
diff --git a/payloads/library/general/Setup-Automation b/payloads/library/general/Setup-Automation
index 5836393..0f8e280 100644
--- a/payloads/library/general/Setup-Automation
+++ b/payloads/library/general/Setup-Automation
@@ -1,7 +1,7 @@
REM Setup-Automation
REM Version 1.0
REM OS: Multi
-REM Author: 0iphor13
+REM Author: 0i41E
REM If you need to setup multiple cables via the python flasher, this might save you some time.
REM Make sure that another cable/plug/adapter is connected via programmer!
diff --git a/payloads/library/prank/-OMG-AcidBurn/README.md b/payloads/library/prank/-OMG-AcidBurn/README.md
index 05d41fe..b41335d 100644
--- a/payloads/library/prank/-OMG-AcidBurn/README.md
+++ b/payloads/library/prank/-OMG-AcidBurn/README.md
@@ -105,7 +105,7 @@ Arf
* [Hak5](https://hak5.org/)
* [MG](https://github.com/OMG-MG)
-* [0iphor13](https://github.com/0iphor13)
+* [0i41E](https://github.com/0i41E)
* [PhilSutter](https://github.com/PhilSutter)
diff --git a/payloads/library/prank/-OMG-JumpScare/README.md b/payloads/library/prank/-OMG-JumpScare/README.md
index 1f7cec8..ae35008 100644
--- a/payloads/library/prank/-OMG-JumpScare/README.md
+++ b/payloads/library/prank/-OMG-JumpScare/README.md
@@ -95,7 +95,7 @@ Arf
* [Hak5](https://hak5.org/)
* [MG](https://github.com/OMG-MG)
-* [0iphor13](https://github.com/0iphor13)
+* [0i41E](https://github.com/0i41E)
* [PhilSutter](https://github.com/PhilSutter)
diff --git a/payloads/library/remote_access/OMGHoax/payload.txt b/payloads/library/remote_access/OMGHoax/payload.txt
index 14d9ad4..8243df9 100644
--- a/payloads/library/remote_access/OMGHoax/payload.txt
+++ b/payloads/library/remote_access/OMGHoax/payload.txt
@@ -2,7 +2,7 @@ REM OMGHoax
REM Version 1.0
REM OS: Windows
REM Author: rf_bandit
-REM Thank You: t3l3machus, 0iphor13
+REM Thank You: t3l3machus, 0i41E
REM Requirements: Firmware Version 3.0+
REM Simple way to use the Hoaxshell standalone listener with OMG cables/plug
diff --git a/payloads/library/remote_access/PingZhellCable/PingZhellClient.pl b/payloads/library/remote_access/PingZhellCable/PingZhellClient.pl
index cd1dde7..e20e6bd 100644
--- a/payloads/library/remote_access/PingZhellCable/PingZhellClient.pl
+++ b/payloads/library/remote_access/PingZhellCable/PingZhellClient.pl
@@ -15,7 +15,7 @@
# You should have received a copy of the GNU General Public License
# along with this program. If not, see .
#
-# Modified by 0iphor13 for PingZhellCable
+# Modified by 0i41E for PingZhellCable
#
#
#
diff --git a/payloads/library/remote_access/PingZhellCable/README.md b/payloads/library/remote_access/PingZhellCable/README.md
index af9fd76..60ea0f8 100644
--- a/payloads/library/remote_access/PingZhellCable/README.md
+++ b/payloads/library/remote_access/PingZhellCable/README.md
@@ -1,6 +1,6 @@
**Title: PingZhellCable**
-
Author: 0iphor13
+
Author: 0i41E
OS: Windows
Version: 1.1
Requirements: OMG Firmware v.2.5 or higher
@@ -28,7 +28,7 @@ Disable ICMP replies by the OS:
`sysctl -w net.ipv4.icmp_echo_ignore_all=1`
Start the client -> `perl PingZhellClient.pl`
-![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png)
+![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png)
!!!Insert the IP of your attacking machine into the payload variable $IP!!!
diff --git a/payloads/library/remote_access/PingZhellCable/payload.txt b/payloads/library/remote_access/PingZhellCable/payload.txt
index 992ccc7..83704d0 100644
--- a/payloads/library/remote_access/PingZhellCable/payload.txt
+++ b/payloads/library/remote_access/PingZhellCable/payload.txt
@@ -1,7 +1,7 @@
REM PingZhellCable
REM Version 1.1
REM OS: Windows
-REM Author: 0iphor13
+REM Author: 0i41E
REM Requirements: OMG Firmware v.2.5 or higher
REM Getting remote access via ICMP
diff --git a/payloads/library/remote_access/RemoteDeskCable/README.md b/payloads/library/remote_access/RemoteDeskCable/README.md
index de2bd5b..7a9745b 100644
--- a/payloads/library/remote_access/RemoteDeskCable/README.md
+++ b/payloads/library/remote_access/RemoteDeskCable/README.md
@@ -1,6 +1,6 @@
**Title: RemoteDeskCable**
-
Author: 0iphor13
+
Author: 0i41E
OS: Windows
Version: 3.0
Requirements: OMG Firmware v.3.0 or higher
@@ -17,5 +17,5 @@ What is RemoteDeskCable?
- Plug in your Cable/Plug/Adapter - run away
- Use a browser supporting MJPEG, like FireFox, and visit 127.0.0.1:#PORT.
- Fire up the payload for the screenshare to appear within FireFox.
-![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png)
-![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png)
+![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png)
+![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png)
diff --git a/payloads/library/remote_access/RemoteDeskCable/payload.txt b/payloads/library/remote_access/RemoteDeskCable/payload.txt
index 7f8a57b..b67f6ae 100644
--- a/payloads/library/remote_access/RemoteDeskCable/payload.txt
+++ b/payloads/library/remote_access/RemoteDeskCable/payload.txt
@@ -1,7 +1,7 @@
REM Title: RemoteDeskCable
REM Version: 3.0
REM OS: Windows
-REM Author: 0iphor13
+REM Author: 0i41E
REM Description: Get remote screen access to view targets screen.
REM Requirements: Firmware Version 3.0 min
diff --git a/payloads/library/remote_access/ReverseCable II/payload.txt b/payloads/library/remote_access/ReverseCable II/payload.txt
index 281323d..4f6e005 100644
--- a/payloads/library/remote_access/ReverseCable II/payload.txt
+++ b/payloads/library/remote_access/ReverseCable II/payload.txt
@@ -1,7 +1,7 @@
REM ReverseCableII
REM Version 1.0
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
-REM Author: 0iphor13
+REM Author: 0i41E
REM UDP Reverse shell, based on ReverseDuckyIII, executed in the background. Might create a firewall pop up, but will execute anyway.
REM Fill in Attacker-IP and Port in Line 20
diff --git a/payloads/library/remote_access/ReverseCable/payload.txt b/payloads/library/remote_access/ReverseCable/payload.txt
index 8d0d6de..8a53371 100644
--- a/payloads/library/remote_access/ReverseCable/payload.txt
+++ b/payloads/library/remote_access/ReverseCable/payload.txt
@@ -1,7 +1,7 @@
REM ReverseCable
REM Version 2.0
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
-REM Author: 0iphor13
+REM Author: 0i41E
REM Requirements: Firmware Version 3.0 or higher
REM TCP Reverse shell, based on ReverseDuckyII, executed in the background
diff --git a/payloads/library/remote_access/ReverseCableSSL/README.md b/payloads/library/remote_access/ReverseCableSSL/README.md
index 09cc7eb..f5e99ca 100644
--- a/payloads/library/remote_access/ReverseCableSSL/README.md
+++ b/payloads/library/remote_access/ReverseCableSSL/README.md
@@ -1,6 +1,6 @@
**Title: ReverseCableSSL**
-Author: 0iphor13
+
Author: 0i41E
OS: Windows
Version: 2.0
Requirements: OMG Firmware v.3.0 or higher
@@ -24,5 +24,5 @@ I recommend openssl itself or ncat - Example syntax for both:
- Plug in Cable.
-![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png)
-![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg)
+![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png)
+![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg)
diff --git a/payloads/library/remote_access/ReverseCableSSL/payload.txt b/payloads/library/remote_access/ReverseCableSSL/payload.txt
index 72792cd..aac1fb1 100644
--- a/payloads/library/remote_access/ReverseCableSSL/payload.txt
+++ b/payloads/library/remote_access/ReverseCableSSL/payload.txt
@@ -1,7 +1,7 @@
REM ReverseCableSSL
REM Version 2.0
REM OS: Windows
-REM Author: 0iphor13
+REM Author: 0i41E
REM Requirements: OMG Firmware v.3.0 or higher
REM Getting encrypted remote access via powershell