Merge pull request #227 from 0i41E/master

Username Change
pull/230/head
Kalani Helekunihi 2024-05-28 13:49:08 -04:00 committed by GitHub
commit f4d54cfebe
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
22 changed files with 28 additions and 28 deletions

View File

@ -1,6 +1,6 @@
**Title: SamDumpCable** **Title: SamDumpCable**
<p>Author: 0iphor13<br> <p>Author: 0i41E<br>
OS: Windows<br> OS: Windows<br>
Version: 1.0<br> Version: 1.0<br>
Requirements: OMG Firmware v.2.5 or higher</p> Requirements: OMG Firmware v.2.5 or higher</p>
@ -23,4 +23,4 @@ Afterwards you can use a tool like samdump2 to extract the users hashes.</p>
**!Disclaimer! samdump2 has proven to be unreliable in the recent past.** **!Disclaimer! samdump2 has proven to be unreliable in the recent past.**
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png) ![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png)

View File

@ -1,6 +1,6 @@
REM Title: SamDumpCable REM Title: SamDumpCable
REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like samdump2, to get the users hashes. REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like samdump2, to get the users hashes.
REM Author: 0iphor13 REM Author: 0i41E
REM Version: 1.0 REM Version: 1.0
REM Category: Credentials REM Category: Credentials
REM Requirements: OMG Firmware v.2.5 or higher REM Requirements: OMG Firmware v.2.5 or higher

View File

@ -1,7 +1,7 @@
REM Ai-Cable REM Ai-Cable
REM Version 2.0 REM Version 2.0
REM OS: MULTI (Tested with the OMG-Plug on Google Chrome/Windows 10 at screen resolution 1920 x 1080) REM OS: MULTI (Tested with the OMG-Plug on Google Chrome/Windows 10 at screen resolution 1920 x 1080)
REM Author: 0iphor13 REM Author: 0i41E
REM This payload will write its own payload, until you kill it! Maybe, if you wait long enough, it will create a payload of the month... REM This payload will write its own payload, until you kill it! Maybe, if you wait long enough, it will create a payload of the month...
REM Click run and let it happen, don't move! Might not work properly on every system due to timings, screen resolution, etc... REM Click run and let it happen, don't move! Might not work properly on every system due to timings, screen resolution, etc...

View File

@ -1,6 +1,6 @@
**Title: FodCable - UAC Bypass** **Title: FodCable - UAC Bypass**
Author: 0iphor13 Author: 0i41E
Version: 1.0 Version: 1.0

View File

@ -1,6 +1,6 @@
**Title: FodCableII - UAC Bypass** **Title: FodCableII - UAC Bypass**
<p>Author: 0iphor13<br> <p>Author: 0i41E<br>
Version: 1.0<br> Version: 1.0<br>
Requirements: OMG Firmware v.2.5 or higher</p> Requirements: OMG Firmware v.2.5 or higher</p>

View File

@ -1,7 +1,7 @@
REM FodCableII REM FodCableII
REM Version 1.0 REM Version 1.0
REM OS: Windows REM OS: Windows
REM Author: 0iphor13 REM Author: 0i41E
REM Requirements: OMG Firmware v.2.5 or higher REM Requirements: OMG Firmware v.2.5 or higher
REM Using FodHelper.exe to bypass UAC and get an elevated shell REM Using FodHelper.exe to bypass UAC and get an elevated shell

View File

@ -1,6 +1,6 @@
**Title: Windows11_CommandPrompt_Downgrade** **Title: Windows11_CommandPrompt_Downgrade**
<p>Author: 0iphor13<br> <p>Author: 0i41E<br>
OS: Windows11<br> OS: Windows11<br>
Version: 1.0<br> Version: 1.0<br>

View File

@ -1,7 +1,7 @@
REM Windows11_CommandPrompt_Downgrade REM Windows11_CommandPrompt_Downgrade
REM Version 1.0 REM Version 1.0
REM OS: Windows11 REM OS: Windows11
REM Author: 0iphor13 REM Author: 0i41E
REM Requirements: OMG Firmware v.3.0 or higher REM Requirements: OMG Firmware v.3.0 or higher
REM Changing the Command Prompt to Conhost, to enable hidden Powershell for certain W11 Builds. REM Changing the Command Prompt to Conhost, to enable hidden Powershell for certain W11 Builds.
REM Other Methods values are also provided for backup or simply playing around. REM Other Methods values are also provided for backup or simply playing around.

View File

@ -1,7 +1,7 @@
REM OMG-AwarenessTraining REM OMG-AwarenessTraining
REM Version 1.1 REM Version 1.1
REM OS: Windows REM OS: Windows
REM Author: 0iphor13 REM Author: 0i41E
REM A small message box, telling the user that he violated the security policy. The hostname of the user will be send to a webhook to report the incident REM A small message box, telling the user that he violated the security policy. The hostname of the user will be send to a webhook to report the incident
REM Fill in the (Web)hook URL, in LINE 31, where the hostname should be reported to. REM Fill in the (Web)hook URL, in LINE 31, where the hostname should be reported to.

View File

@ -1,7 +1,7 @@
REM Setup-Automation REM Setup-Automation
REM Version 1.0 REM Version 1.0
REM OS: Multi REM OS: Multi
REM Author: 0iphor13 REM Author: 0i41E
REM If you need to setup multiple cables via the python flasher, this might save you some time. REM If you need to setup multiple cables via the python flasher, this might save you some time.
REM Make sure that another cable/plug/adapter is connected via programmer! REM Make sure that another cable/plug/adapter is connected via programmer!

View File

@ -105,7 +105,7 @@ Arf
* [Hak5](https://hak5.org/) * [Hak5](https://hak5.org/)
* [MG](https://github.com/OMG-MG) * [MG](https://github.com/OMG-MG)
* [0iphor13](https://github.com/0iphor13) * [0i41E](https://github.com/0i41E)
* [PhilSutter](https://github.com/PhilSutter) * [PhilSutter](https://github.com/PhilSutter)

View File

@ -95,7 +95,7 @@ Arf
* [Hak5](https://hak5.org/) * [Hak5](https://hak5.org/)
* [MG](https://github.com/OMG-MG) * [MG](https://github.com/OMG-MG)
* [0iphor13](https://github.com/0iphor13) * [0i41E](https://github.com/0i41E)
* [PhilSutter](https://github.com/PhilSutter) * [PhilSutter](https://github.com/PhilSutter)

View File

@ -2,7 +2,7 @@ REM OMGHoax
REM Version 1.0 REM Version 1.0
REM OS: Windows REM OS: Windows
REM Author: rf_bandit REM Author: rf_bandit
REM Thank You: t3l3machus, 0iphor13 REM Thank You: t3l3machus, 0i41E
REM Requirements: Firmware Version 3.0+ REM Requirements: Firmware Version 3.0+
REM Simple way to use the Hoaxshell standalone listener with OMG cables/plug REM Simple way to use the Hoaxshell standalone listener with OMG cables/plug

View File

@ -15,7 +15,7 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
# #
# Modified by 0iphor13 for PingZhellCable # Modified by 0i41E for PingZhellCable
# #
# #
# #

View File

@ -1,6 +1,6 @@
**Title: PingZhellCable** **Title: PingZhellCable**
<p>Author: 0iphor13<br> <p>Author: 0i41E<br>
OS: Windows<br> OS: Windows<br>
Version: 1.1<br> Version: 1.1<br>
Requirements: OMG Firmware v.2.5 or higher</p> Requirements: OMG Firmware v.2.5 or higher</p>
@ -28,7 +28,7 @@ Disable ICMP replies by the OS:
`sysctl -w net.ipv4.icmp_echo_ignore_all=1` `sysctl -w net.ipv4.icmp_echo_ignore_all=1`
Start the client -> `perl PingZhellClient.pl` Start the client -> `perl PingZhellClient.pl`
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png) ![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png)
<p>!!!Insert the IP of your attacking machine into the payload variable $IP!!!<br> <p>!!!Insert the IP of your attacking machine into the payload variable $IP!!!<br>

View File

@ -1,7 +1,7 @@
REM PingZhellCable REM PingZhellCable
REM Version 1.1 REM Version 1.1
REM OS: Windows REM OS: Windows
REM Author: 0iphor13 REM Author: 0i41E
REM Requirements: OMG Firmware v.2.5 or higher REM Requirements: OMG Firmware v.2.5 or higher
REM Getting remote access via ICMP REM Getting remote access via ICMP

View File

@ -1,6 +1,6 @@
**Title: RemoteDeskCable** **Title: RemoteDeskCable**
<p>Author: 0iphor13<br> <p>Author: 0i41E<br>
OS: Windows<br> OS: Windows<br>
Version: 3.0<br> Version: 3.0<br>
Requirements: OMG Firmware v.3.0 or higher</p> Requirements: OMG Firmware v.3.0 or higher</p>
@ -17,5 +17,5 @@ What is RemoteDeskCable?
- Plug in your Cable/Plug/Adapter - run away - Plug in your Cable/Plug/Adapter - run away
- Use a browser supporting MJPEG, like FireFox, and visit 127.0.0.1:#PORT. - Use a browser supporting MJPEG, like FireFox, and visit 127.0.0.1:#PORT.
- Fire up the payload for the screenshare to appear within FireFox. - Fire up the payload for the screenshare to appear within FireFox.
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png) ![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png)
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png) ![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png)

View File

@ -1,7 +1,7 @@
REM Title: RemoteDeskCable REM Title: RemoteDeskCable
REM Version: 3.0 REM Version: 3.0
REM OS: Windows REM OS: Windows
REM Author: 0iphor13 REM Author: 0i41E
REM Description: Get remote screen access to view targets screen. REM Description: Get remote screen access to view targets screen.
REM Requirements: Firmware Version 3.0 min REM Requirements: Firmware Version 3.0 min

View File

@ -1,7 +1,7 @@
REM ReverseCableII REM ReverseCableII
REM Version 1.0 REM Version 1.0
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux) REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
REM Author: 0iphor13 REM Author: 0i41E
REM UDP Reverse shell, based on ReverseDuckyIII, executed in the background. Might create a firewall pop up, but will execute anyway. REM UDP Reverse shell, based on ReverseDuckyIII, executed in the background. Might create a firewall pop up, but will execute anyway.
REM Fill in Attacker-IP and Port in Line 20 REM Fill in Attacker-IP and Port in Line 20

View File

@ -1,7 +1,7 @@
REM ReverseCable REM ReverseCable
REM Version 2.0 REM Version 2.0
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux) REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
REM Author: 0iphor13 REM Author: 0i41E
REM Requirements: Firmware Version 3.0 or higher REM Requirements: Firmware Version 3.0 or higher
REM TCP Reverse shell, based on ReverseDuckyII, executed in the background REM TCP Reverse shell, based on ReverseDuckyII, executed in the background

View File

@ -1,6 +1,6 @@
**Title: ReverseCableSSL** **Title: ReverseCableSSL**
<p>Author: 0iphor13<br> <p>Author: 0i41E<br>
OS: Windows<br> OS: Windows<br>
Version: 2.0<br> Version: 2.0<br>
Requirements: OMG Firmware v.3.0 or higher</p> Requirements: OMG Firmware v.3.0 or higher</p>
@ -24,5 +24,5 @@ I recommend openssl itself or ncat - Example syntax for both:<br>
- Plug in Cable. - Plug in Cable.
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png) ![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png)
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg) ![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg)

View File

@ -1,7 +1,7 @@
REM ReverseCableSSL REM ReverseCableSSL
REM Version 2.0 REM Version 2.0
REM OS: Windows REM OS: Windows
REM Author: 0iphor13 REM Author: 0i41E
REM Requirements: OMG Firmware v.3.0 or higher REM Requirements: OMG Firmware v.3.0 or higher
REM Getting encrypted remote access via powershell REM Getting encrypted remote access via powershell