Skip to content

Commit

Permalink
Username Change
Browse files Browse the repository at this point in the history
  • Loading branch information
0i41E authored May 28, 2024
1 parent 3740a98 commit 1bb4320
Show file tree
Hide file tree
Showing 22 changed files with 28 additions and 28 deletions.
4 changes: 2 additions & 2 deletions payloads/library/credentials/SamDumpCable/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
**Title: SamDumpCable**

<p>Author: 0iphor13<br>
<p>Author: 0i41E<br>
OS: Windows<br>
Version: 1.0<br>
Requirements: OMG Firmware v.2.5 or higher</p>
Expand All @@ -23,4 +23,4 @@ Afterwards you can use a tool like samdump2 to extract the users hashes.</p>

**!Disclaimer! samdump2 has proven to be unreliable in the recent past.**

![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png)
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/credentials/SamDumpCable/sam.png)
2 changes: 1 addition & 1 deletion payloads/library/credentials/SamDumpCable/payload.txt
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
REM Title: SamDumpCable
REM Description: Dump users sam and system hive and exfiltrate them. Afterwards you can use a tool like samdump2, to get the users hashes.
REM Author: 0iphor13
REM Author: 0i41E
REM Version: 1.0
REM Category: Credentials
REM Requirements: OMG Firmware v.2.5 or higher
Expand Down
2 changes: 1 addition & 1 deletion payloads/library/execution/Ai-Cable
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM Ai-Cable
REM Version 2.0
REM OS: MULTI (Tested with the OMG-Plug on Google Chrome/Windows 10 at screen resolution 1920 x 1080)
REM Author: 0iphor13
REM Author: 0i41E

REM This payload will write its own payload, until you kill it! Maybe, if you wait long enough, it will create a payload of the month...
REM Click run and let it happen, don't move! Might not work properly on every system due to timings, screen resolution, etc...
Expand Down
2 changes: 1 addition & 1 deletion payloads/library/execution/FodCable - UAC Bypass/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
**Title: FodCable - UAC Bypass**

Author: 0iphor13
Author: 0i41E

Version: 1.0

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
**Title: FodCableII - UAC Bypass**

<p>Author: 0iphor13<br>
<p>Author: 0i41E<br>
Version: 1.0<br>
Requirements: OMG Firmware v.2.5 or higher</p>

Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM FodCableII
REM Version 1.0
REM OS: Windows
REM Author: 0iphor13
REM Author: 0i41E
REM Requirements: OMG Firmware v.2.5 or higher

REM Using FodHelper.exe to bypass UAC and get an elevated shell
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
**Title: Windows11_CommandPrompt_Downgrade**

<p>Author: 0iphor13<br>
<p>Author: 0i41E<br>
OS: Windows11<br>
Version: 1.0<br>

Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM Windows11_CommandPrompt_Downgrade
REM Version 1.0
REM OS: Windows11
REM Author: 0iphor13
REM Author: 0i41E
REM Requirements: OMG Firmware v.3.0 or higher
REM Changing the Command Prompt to Conhost, to enable hidden Powershell for certain W11 Builds.
REM Other Methods values are also provided for backup or simply playing around.
Expand Down
2 changes: 1 addition & 1 deletion payloads/library/general/OMG-AwarenessTraining
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM OMG-AwarenessTraining
REM Version 1.1
REM OS: Windows
REM Author: 0iphor13
REM Author: 0i41E

REM A small message box, telling the user that he violated the security policy. The hostname of the user will be send to a webhook to report the incident
REM Fill in the (Web)hook URL, in LINE 31, where the hostname should be reported to.
Expand Down
2 changes: 1 addition & 1 deletion payloads/library/general/Setup-Automation
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM Setup-Automation
REM Version 1.0
REM OS: Multi
REM Author: 0iphor13
REM Author: 0i41E

REM If you need to setup multiple cables via the python flasher, this might save you some time.
REM Make sure that another cable/plug/adapter is connected via programmer!
Expand Down
2 changes: 1 addition & 1 deletion payloads/library/prank/-OMG-AcidBurn/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ Arf

* [Hak5](https://hak5.org/)
* [MG](https://github.com/OMG-MG)
* [0iphor13](https://github.com/0iphor13)
* [0i41E](https://github.com/0i41E)
* [PhilSutter](https://github.com/PhilSutter)


Expand Down
2 changes: 1 addition & 1 deletion payloads/library/prank/-OMG-JumpScare/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@ Arf

* [Hak5](https://hak5.org/)
* [MG](https://github.com/OMG-MG)
* [0iphor13](https://github.com/0iphor13)
* [0i41E](https://github.com/0i41E)
* [PhilSutter](https://github.com/PhilSutter)


Expand Down
2 changes: 1 addition & 1 deletion payloads/library/remote_access/OMGHoax/payload.txt
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ REM OMGHoax
REM Version 1.0
REM OS: Windows
REM Author: rf_bandit
REM Thank You: t3l3machus, 0iphor13
REM Thank You: t3l3machus, 0i41E
REM Requirements: Firmware Version 3.0+

REM Simple way to use the Hoaxshell standalone listener with OMG cables/plug
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
# Modified by 0iphor13 for PingZhellCable
# Modified by 0i41E for PingZhellCable
#
#
#
Expand Down
4 changes: 2 additions & 2 deletions payloads/library/remote_access/PingZhellCable/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
**Title: PingZhellCable**

<p>Author: 0iphor13<br>
<p>Author: 0i41E<br>
OS: Windows<br>
Version: 1.1<br>
Requirements: OMG Firmware v.2.5 or higher</p>
Expand Down Expand Up @@ -28,7 +28,7 @@ Disable ICMP replies by the OS:
`sysctl -w net.ipv4.icmp_echo_ignore_all=1`

Start the client -> `perl PingZhellClient.pl`
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png)
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/PingZhellCable/setup.png)

<p>!!!Insert the IP of your attacking machine into the payload variable $IP!!!<br>

Expand Down
2 changes: 1 addition & 1 deletion payloads/library/remote_access/PingZhellCable/payload.txt
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM PingZhellCable
REM Version 1.1
REM OS: Windows
REM Author: 0iphor13
REM Author: 0i41E
REM Requirements: OMG Firmware v.2.5 or higher

REM Getting remote access via ICMP
Expand Down
6 changes: 3 additions & 3 deletions payloads/library/remote_access/RemoteDeskCable/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
**Title: RemoteDeskCable**

<p>Author: 0iphor13<br>
<p>Author: 0i41E<br>
OS: Windows<br>
Version: 3.0<br>
Requirements: OMG Firmware v.3.0 or higher</p>
Expand All @@ -17,5 +17,5 @@ What is RemoteDeskCable?
- Plug in your Cable/Plug/Adapter - run away
- Use a browser supporting MJPEG, like FireFox, and visit 127.0.0.1:#PORT.
- Fire up the payload for the screenshare to appear within FireFox.
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png)
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png)
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-28-28.png)
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/RemoteDeskCable/Screenshot%20from%202022-01-16%2013-29-03.png)
2 changes: 1 addition & 1 deletion payloads/library/remote_access/RemoteDeskCable/payload.txt
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM Title: RemoteDeskCable
REM Version: 3.0
REM OS: Windows
REM Author: 0iphor13
REM Author: 0i41E
REM Description: Get remote screen access to view targets screen.
REM Requirements: Firmware Version 3.0 min

Expand Down
2 changes: 1 addition & 1 deletion payloads/library/remote_access/ReverseCable II/payload.txt
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM ReverseCableII
REM Version 1.0
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
REM Author: 0iphor13
REM Author: 0i41E

REM UDP Reverse shell, based on ReverseDuckyIII, executed in the background. Might create a firewall pop up, but will execute anyway.
REM Fill in Attacker-IP and Port in Line 20
Expand Down
2 changes: 1 addition & 1 deletion payloads/library/remote_access/ReverseCable/payload.txt
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM ReverseCable
REM Version 2.0
REM OS: Windows / Linux(?) (Not tested with Powershell on Linux)
REM Author: 0iphor13
REM Author: 0i41E
REM Requirements: Firmware Version 3.0 or higher

REM TCP Reverse shell, based on ReverseDuckyII, executed in the background
Expand Down
6 changes: 3 additions & 3 deletions payloads/library/remote_access/ReverseCableSSL/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
**Title: ReverseCableSSL**

<p>Author: 0iphor13<br>
<p>Author: 0i41E<br>
OS: Windows<br>
Version: 2.0<br>
Requirements: OMG Firmware v.3.0 or higher</p>
Expand All @@ -24,5 +24,5 @@ I recommend openssl itself or ncat - Example syntax for both:<br>

- Plug in Cable.

![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png)
![alt text](https://github.com/0iphor13/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg)
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/CreateCert.png)
![alt text](https://github.com/0i41E/omg-payloads/blob/master/payloads/library/remote_access/ReverseCableSSL/StartScreen.jpg)
2 changes: 1 addition & 1 deletion payloads/library/remote_access/ReverseCableSSL/payload.txt
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
REM ReverseCableSSL
REM Version 2.0
REM OS: Windows
REM Author: 0iphor13
REM Author: 0i41E
REM Requirements: OMG Firmware v.3.0 or higher

REM Getting encrypted remote access via powershell
Expand Down

0 comments on commit 1bb4320

Please sign in to comment.