From 1bb43203e745dd16e29ab93702f4e96c265b09ee Mon Sep 17 00:00:00 2001 From: 0i41E <79219148+0i41E@users.noreply.github.com> Date: Tue, 28 May 2024 19:28:14 +0200 Subject: [PATCH] Username Change --- payloads/library/credentials/SamDumpCable/README.md | 4 ++-- payloads/library/credentials/SamDumpCable/payload.txt | 2 +- payloads/library/execution/Ai-Cable | 2 +- payloads/library/execution/FodCable - UAC Bypass/README.md | 2 +- payloads/library/execution/FodCable2 - UAC Bypass/README.md | 2 +- .../library/execution/FodCable2 - UAC Bypass/payload.txt | 2 +- .../execution/Windows11_CommandPrompt_Downgrade/README.md | 2 +- .../execution/Windows11_CommandPrompt_Downgrade/payload.txt | 2 +- payloads/library/general/OMG-AwarenessTraining | 2 +- payloads/library/general/Setup-Automation | 2 +- payloads/library/prank/-OMG-AcidBurn/README.md | 2 +- payloads/library/prank/-OMG-JumpScare/README.md | 2 +- payloads/library/remote_access/OMGHoax/payload.txt | 2 +- .../library/remote_access/PingZhellCable/PingZhellClient.pl | 2 +- payloads/library/remote_access/PingZhellCable/README.md | 4 ++-- payloads/library/remote_access/PingZhellCable/payload.txt | 2 +- payloads/library/remote_access/RemoteDeskCable/README.md | 6 +++--- payloads/library/remote_access/RemoteDeskCable/payload.txt | 2 +- payloads/library/remote_access/ReverseCable II/payload.txt | 2 +- payloads/library/remote_access/ReverseCable/payload.txt | 2 +- payloads/library/remote_access/ReverseCableSSL/README.md | 6 +++--- payloads/library/remote_access/ReverseCableSSL/payload.txt | 2 +- 22 files changed, 28 insertions(+), 28 deletions(-) diff --git a/payloads/library/credentials/SamDumpCable/README.md b/payloads/library/credentials/SamDumpCable/README.md index 2575429..8a0d086 100644 --- a/payloads/library/credentials/SamDumpCable/README.md +++ b/payloads/library/credentials/SamDumpCable/README.md @@ -1,6 +1,6 @@ **Title: SamDumpCable** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 1.0
Requirements: OMG Firmware v.2.5 or higher

@@ -23,4 +23,4 @@ Afterwards you can use a tool like samdump2 to extract the users hashes.

**!Disclaimer! samdump2 has proven to be unreliable in the recent past.** -![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png) +![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png) diff --git a/payloads/library/credentials/SamDumpCable/payload.txt b/payloads/library/credentials/SamDumpCable/payload.txt index 458f4a2..fc64373 100644 --- a/payloads/library/credentials/SamDumpCable/payload.txt +++ b/payloads/library/credentials/SamDumpCable/payload.txt @@ -1,6 +1,6 @@ REM Title: SamDumpCable REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like samdump2, to get the users hashes. -REM Author: 0iphor13 +REM Author: 0i41E REM Version: 1.0 REM Category: Credentials REM Requirements: OMG Firmware v.2.5 or higher diff --git a/payloads/library/execution/Ai-Cable b/payloads/library/execution/Ai-Cable index 471b3c5..ac930cd 100644 --- a/payloads/library/execution/Ai-Cable +++ b/payloads/library/execution/Ai-Cable @@ -1,7 +1,7 @@ REM Ai-Cable REM Version 2.0 REM OS: MULTI (Tested with the OMG-Plug on Google Chrome/Windows 10 at screen resolution 1920 x 1080) -REM Author: 0iphor13 +REM Author: 0i41E REM This payload will write its own payload, until you kill it! Maybe, if you wait long enough, it will create a payload of the month... REM Click run and let it happen, don't move! Might not work properly on every system due to timings, screen resolution, etc... diff --git a/payloads/library/execution/FodCable - UAC Bypass/README.md b/payloads/library/execution/FodCable - UAC Bypass/README.md index 2a7f5ce..a5fc88b 100644 --- a/payloads/library/execution/FodCable - UAC Bypass/README.md +++ b/payloads/library/execution/FodCable - UAC Bypass/README.md @@ -1,6 +1,6 @@ **Title: FodCable - UAC Bypass** -Author: 0iphor13 +Author: 0i41E Version: 1.0 diff --git a/payloads/library/execution/FodCable2 - UAC Bypass/README.md b/payloads/library/execution/FodCable2 - UAC Bypass/README.md index 407f5d3..b24f165 100644 --- a/payloads/library/execution/FodCable2 - UAC Bypass/README.md +++ b/payloads/library/execution/FodCable2 - UAC Bypass/README.md @@ -1,6 +1,6 @@ **Title: FodCableII - UAC Bypass** -

Author: 0iphor13
+

Author: 0i41E
Version: 1.0
Requirements: OMG Firmware v.2.5 or higher

diff --git a/payloads/library/execution/FodCable2 - UAC Bypass/payload.txt b/payloads/library/execution/FodCable2 - UAC Bypass/payload.txt index 4c6dc86..dea6f98 100644 --- a/payloads/library/execution/FodCable2 - UAC Bypass/payload.txt +++ b/payloads/library/execution/FodCable2 - UAC Bypass/payload.txt @@ -1,7 +1,7 @@ REM FodCableII REM Version 1.0 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM Requirements: OMG Firmware v.2.5 or higher REM Using FodHelper.exe to bypass UAC and get an elevated shell diff --git a/payloads/library/execution/Windows11_CommandPrompt_Downgrade/README.md b/payloads/library/execution/Windows11_CommandPrompt_Downgrade/README.md index 6281a8a..8878745 100644 --- a/payloads/library/execution/Windows11_CommandPrompt_Downgrade/README.md +++ b/payloads/library/execution/Windows11_CommandPrompt_Downgrade/README.md @@ -1,6 +1,6 @@ **Title: Windows11_CommandPrompt_Downgrade** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows11
Version: 1.0
diff --git a/payloads/library/execution/Windows11_CommandPrompt_Downgrade/payload.txt b/payloads/library/execution/Windows11_CommandPrompt_Downgrade/payload.txt index 5f6eac2..62ca90b 100644 --- a/payloads/library/execution/Windows11_CommandPrompt_Downgrade/payload.txt +++ b/payloads/library/execution/Windows11_CommandPrompt_Downgrade/payload.txt @@ -1,7 +1,7 @@ REM Windows11_CommandPrompt_Downgrade REM Version 1.0 REM OS: Windows11 -REM Author: 0iphor13 +REM Author: 0i41E REM Requirements: OMG Firmware v.3.0 or higher REM Changing the Command Prompt to Conhost, to enable hidden Powershell for certain W11 Builds. REM Other Methods values are also provided for backup or simply playing around. diff --git a/payloads/library/general/OMG-AwarenessTraining b/payloads/library/general/OMG-AwarenessTraining index 1ef37b2..82cb7c0 100644 --- a/payloads/library/general/OMG-AwarenessTraining +++ b/payloads/library/general/OMG-AwarenessTraining @@ -1,7 +1,7 @@ REM OMG-AwarenessTraining REM Version 1.1 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM A small message box, telling the user that he violated the security policy. The hostname of the user will be send to a webhook to report the incident REM Fill in the (Web)hook URL, in LINE 31, where the hostname should be reported to. diff --git a/payloads/library/general/Setup-Automation b/payloads/library/general/Setup-Automation index 5836393..0f8e280 100644 --- a/payloads/library/general/Setup-Automation +++ b/payloads/library/general/Setup-Automation @@ -1,7 +1,7 @@ REM Setup-Automation REM Version 1.0 REM OS: Multi -REM Author: 0iphor13 +REM Author: 0i41E REM If you need to setup multiple cables via the python flasher, this might save you some time. REM Make sure that another cable/plug/adapter is connected via programmer! diff --git a/payloads/library/prank/-OMG-AcidBurn/README.md b/payloads/library/prank/-OMG-AcidBurn/README.md index 05d41fe..b41335d 100644 --- a/payloads/library/prank/-OMG-AcidBurn/README.md +++ b/payloads/library/prank/-OMG-AcidBurn/README.md @@ -105,7 +105,7 @@ Arf * [Hak5](https://hak5.org/) * [MG](https://github.com/OMG-MG) -* [0iphor13](https://github.com/0iphor13) +* [0i41E](https://github.com/0i41E) * [PhilSutter](https://github.com/PhilSutter) diff --git a/payloads/library/prank/-OMG-JumpScare/README.md b/payloads/library/prank/-OMG-JumpScare/README.md index 1f7cec8..ae35008 100644 --- a/payloads/library/prank/-OMG-JumpScare/README.md +++ b/payloads/library/prank/-OMG-JumpScare/README.md @@ -95,7 +95,7 @@ Arf * [Hak5](https://hak5.org/) * [MG](https://github.com/OMG-MG) -* [0iphor13](https://github.com/0iphor13) +* [0i41E](https://github.com/0i41E) * [PhilSutter](https://github.com/PhilSutter) diff --git a/payloads/library/remote_access/OMGHoax/payload.txt b/payloads/library/remote_access/OMGHoax/payload.txt index 14d9ad4..8243df9 100644 --- a/payloads/library/remote_access/OMGHoax/payload.txt +++ b/payloads/library/remote_access/OMGHoax/payload.txt @@ -2,7 +2,7 @@ REM OMGHoax REM Version 1.0 REM OS: Windows REM Author: rf_bandit -REM Thank You: t3l3machus, 0iphor13 +REM Thank You: t3l3machus, 0i41E REM Requirements: Firmware Version 3.0+ REM Simple way to use the Hoaxshell standalone listener with OMG cables/plug diff --git a/payloads/library/remote_access/PingZhellCable/PingZhellClient.pl b/payloads/library/remote_access/PingZhellCable/PingZhellClient.pl index cd1dde7..e20e6bd 100644 --- a/payloads/library/remote_access/PingZhellCable/PingZhellClient.pl +++ b/payloads/library/remote_access/PingZhellCable/PingZhellClient.pl @@ -15,7 +15,7 @@ # You should have received a copy of the GNU General Public License # along with this program. If not, see . # -# Modified by 0iphor13 for PingZhellCable +# Modified by 0i41E for PingZhellCable # # # diff --git a/payloads/library/remote_access/PingZhellCable/README.md b/payloads/library/remote_access/PingZhellCable/README.md index af9fd76..60ea0f8 100644 --- a/payloads/library/remote_access/PingZhellCable/README.md +++ b/payloads/library/remote_access/PingZhellCable/README.md @@ -1,6 +1,6 @@ **Title: PingZhellCable** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 1.1
Requirements: OMG Firmware v.2.5 or higher

@@ -28,7 +28,7 @@ Disable ICMP replies by the OS: `sysctl -w net.ipv4.icmp_echo_ignore_all=1` Start the client -> `perl PingZhellClient.pl` -![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png) +![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png)

!!!Insert the IP of your attacking machine into the payload variable $IP!!!
diff --git a/payloads/library/remote_access/PingZhellCable/payload.txt b/payloads/library/remote_access/PingZhellCable/payload.txt index 992ccc7..83704d0 100644 --- a/payloads/library/remote_access/PingZhellCable/payload.txt +++ b/payloads/library/remote_access/PingZhellCable/payload.txt @@ -1,7 +1,7 @@ REM PingZhellCable REM Version 1.1 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM Requirements: OMG Firmware v.2.5 or higher REM Getting remote access via ICMP diff --git a/payloads/library/remote_access/RemoteDeskCable/README.md b/payloads/library/remote_access/RemoteDeskCable/README.md index de2bd5b..7a9745b 100644 --- a/payloads/library/remote_access/RemoteDeskCable/README.md +++ b/payloads/library/remote_access/RemoteDeskCable/README.md @@ -1,6 +1,6 @@ **Title: RemoteDeskCable** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 3.0
Requirements: OMG Firmware v.3.0 or higher

@@ -17,5 +17,5 @@ What is RemoteDeskCable? - Plug in your Cable/Plug/Adapter - run away - Use a browser supporting MJPEG, like FireFox, and visit 127.0.0.1:#PORT. - Fire up the payload for the screenshare to appear within FireFox. -![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png) -![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png) +![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png) +![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png) diff --git a/payloads/library/remote_access/RemoteDeskCable/payload.txt b/payloads/library/remote_access/RemoteDeskCable/payload.txt index 7f8a57b..b67f6ae 100644 --- a/payloads/library/remote_access/RemoteDeskCable/payload.txt +++ b/payloads/library/remote_access/RemoteDeskCable/payload.txt @@ -1,7 +1,7 @@ REM Title: RemoteDeskCable REM Version: 3.0 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM Description: Get remote screen access to view targets screen. REM Requirements: Firmware Version 3.0 min diff --git a/payloads/library/remote_access/ReverseCable II/payload.txt b/payloads/library/remote_access/ReverseCable II/payload.txt index 281323d..4f6e005 100644 --- a/payloads/library/remote_access/ReverseCable II/payload.txt +++ b/payloads/library/remote_access/ReverseCable II/payload.txt @@ -1,7 +1,7 @@ REM ReverseCableII REM Version 1.0 REM OS: Windows / Linux(?) (Not tested with Powershell on Linux) -REM Author: 0iphor13 +REM Author: 0i41E REM UDP Reverse shell, based on ReverseDuckyIII, executed in the background. Might create a firewall pop up, but will execute anyway. REM Fill in Attacker-IP and Port in Line 20 diff --git a/payloads/library/remote_access/ReverseCable/payload.txt b/payloads/library/remote_access/ReverseCable/payload.txt index 8d0d6de..8a53371 100644 --- a/payloads/library/remote_access/ReverseCable/payload.txt +++ b/payloads/library/remote_access/ReverseCable/payload.txt @@ -1,7 +1,7 @@ REM ReverseCable REM Version 2.0 REM OS: Windows / Linux(?) (Not tested with Powershell on Linux) -REM Author: 0iphor13 +REM Author: 0i41E REM Requirements: Firmware Version 3.0 or higher REM TCP Reverse shell, based on ReverseDuckyII, executed in the background diff --git a/payloads/library/remote_access/ReverseCableSSL/README.md b/payloads/library/remote_access/ReverseCableSSL/README.md index 09cc7eb..f5e99ca 100644 --- a/payloads/library/remote_access/ReverseCableSSL/README.md +++ b/payloads/library/remote_access/ReverseCableSSL/README.md @@ -1,6 +1,6 @@ **Title: ReverseCableSSL** -

Author: 0iphor13
+

Author: 0i41E
OS: Windows
Version: 2.0
Requirements: OMG Firmware v.3.0 or higher

@@ -24,5 +24,5 @@ I recommend openssl itself or ncat - Example syntax for both:
- Plug in Cable. -![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png) -![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg) +![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png) +![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg) diff --git a/payloads/library/remote_access/ReverseCableSSL/payload.txt b/payloads/library/remote_access/ReverseCableSSL/payload.txt index 72792cd..aac1fb1 100644 --- a/payloads/library/remote_access/ReverseCableSSL/payload.txt +++ b/payloads/library/remote_access/ReverseCableSSL/payload.txt @@ -1,7 +1,7 @@ REM ReverseCableSSL REM Version 2.0 REM OS: Windows -REM Author: 0iphor13 +REM Author: 0i41E REM Requirements: OMG Firmware v.3.0 or higher REM Getting encrypted remote access via powershell