0% found this document useful (0 votes)
183 views6 pages

Script

This document contains the code for a Windows batch script that provides a menu-driven interface to perform various system configuration and security tasks on a Windows 10 system without user consent or knowledge. The script disables security features, changes passwords, deletes files and shares, and more in an apparent attempt to compromise the target system. It notes that the script is for a "Woodson CyberPatriot Team" and not to be distributed.

Uploaded by

Samuel Park
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
183 views6 pages

Script

This document contains the code for a Windows batch script that provides a menu-driven interface to perform various system configuration and security tasks on a Windows 10 system without user consent or knowledge. The script disables security features, changes passwords, deletes files and shares, and more in an apparent attempt to compromise the target system. It notes that the script is for a "Woodson CyberPatriot Team" and not to be distributed.

Uploaded by

Samuel Park
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 6

@ECHO OFF

@color e0
@title WINDOWS 10 SCRIPT
CLS

:MENU
CLS

@ECHO ______________________________________________________

@ECHO WINDOWS 10 SCRIPT, RUN IN C:/ DRIVE... RUN AS ADMIN

@ECHO ______________________________________________________

@ECHO.

@ECHO 1 - Automated Thingies

@ECHO 2 - Password

@ECHO 3 - Features

@ECHO 4 - Services

@ECHO 5 - Multimedia

@ECHO 6 - Backdoor

@ECHO 7 - Applications

@ECHO 8 - Shares

@ECHO 9 - Exit

@ECHO.

@ECHO ______________________________________________________

@ECHO MADE FOR WOODSON CYBERPATRIOT TEAM - DO NOT DISTRIBUTE

@ECHO ______________________________________________________

@SET /P M=Type 1, 2, 3, 4, 5, 6, 7, 8, or 9 then press ENTER:

@IF %M%==1 GOTO AUTO

@IF %M%==2 GOTO PASSWORD

@IF %M%==3 GOTO FEATURES

@IF %M%==4 GOTO SERVICES

@IF %M%==5 GOTO MULTIMEDIA

@IF %M%==6 GOTO BACKDOOR


@IF %M%==7 GOTO APPS

@IF %M%==8 GOTO SHARES

@IF %M%==9 GOTO EXIT

:EXIT
exit

:AUTO
CLS

@net user Administrator /active:no

@net user Guest /active:no

netsh advfirewall set allprofiles state on


netsh advfirewall set allprofiles firewallpolicy blockinboundalways,allowoutbound
netsh advfirewall set allprofiles logging allowedconnections enable
netsh advfirewall set allprofiles logging droppedconnections enable
netsh advfirewall set allprofiles logging maxfilesize 16384
netsh advfirewall set allprofiles logging filename %SYSTEMROOT
%\System32\LogFiles\Firewall\domainfw.log
netsh advfirewall set allprofiles settings remotemanagement disable
netsh advfirewall set allprofiles settings unicastresponsetomulticast disable
netsh advfirewall set allprofiles settings localfirewallrules enable
netsh advfirewall set allprofiles settings localconsecrules enable
netsh advfirewall set allprofiles settings inboundusernotification enable
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=no
netsh advfirewall firewall set rule group="Windows Media Player Network Sharing
Service" new enable=no
netsh advfirewall firewall set rule group="Remote Assistance" new enable=no
netsh advfirewall firewall set rule group="SNMP Trap" new enable=no
netsh advfirewall firewall set rule group="Routing and Remote Access" new enable=no
netsh advfirewall firewall set rule group="Windows Remote Management" new enable=no
netsh advfirewall firewall set rule group="Remote Scheduled Tasks Management" new
enable=no
netsh advfirewall firewall set rule group="Remote Volume Management" new enable=no
netsh advfirewall firewall set rule group="Windows Peer to Peer Collaboration
Foundation" new enable=no
netsh advfirewall firewall set rule group="Wireless Portable Devices" new enable=no
netsh advfirewall firewall set rule group="Netlogon Service" new enable=no
netsh advfirewall firewall set rule group="HomeGroup" new enable=no
netsh advfirewall firewall set rule group="remote administration" new enable=no
netsh advfirewall firewall set rule group="Windows Firewall Remote Management" new
enable=no
for /f "usebackq tokens=*" %G in (`dir "C:\Users" /a:-d-h-s /b /s ^| findstr /v
"Desktop AppData"`) do del /q "%G"
For /f %G in (‘dir /b C:\Users’) do net user %G CyberPatriot!1
@goto MENU
:Finished
CLS
@goto MENU

:PASSWORD

CLS

For /f %G in (‘dir /b C:\Users’) do net user %G Saxophone123!

@GOTO Menu

:SERVICES
CLS

@net start

@set /p ServiceInput=Enter Service Name:

@net stop %ServiceInput%

@SET /p environment="Type X to leave and C to continue:"

@IF /i "%environment%" == "X" GOTO MENU

@IF /i "%environment%" == "C" GOTO SERVICES

@ECHO Invalid Option

:FEATURES
CLS
@SET /p environment="Type D to disable features ,E to enable features and X to
exit:"

@IF /i "%environment%" == "X" GOTO MENU

@IF /i "%environment%" == "E" GOTO FEATURESENABLE

@IF /i "%environment%" == "D" GOTO FEATUREDISABLE

@ECHO Invalid Option

:FEATUREDISABLE

@DISM /online /get-features /format:table

@set /p FeatureInput=Enter Feature Name:

@DISM /online /disable-feature /featurename:%FeatureInput%


CLS

@SET /p environment="Type X to leave, C to continue, and R to restart:"

@IF /i "%environment%" == "X" GOTO MENU

@IF /i "%environment%" == "C" GOTO FEATURESDISABLE

@IF /i "%environment%" == "R" GOTO RESTART

@ECHO Invalid Option

:FEATURESENABLE
CLS

@DISM /online /get-features /format:table

@set /p FeatureInput=Enter Feature Name:

@DISM /online /enable-feature /featurename:%FeatureInput%

CLS

@SET /p environment="Type X to leave, C to continue, and R to restart:"

@IF /i "%environment%" == "X" GOTO MENU

@IF /i "%environment%" == "C" GOTO FEATURESENABLE

@IF /i "%environment%" == "R" GOTO RESTART

@ECHO Invalid Option

:RESTART
@SET /p environment="Type R to restart:"

@IF /i "%environment%" == "R" shutdown /r /t 0

@ECHO Invalid Option

CLS

:MULTIMEDIA

@dir /s/b *.mp3 >listmp3.txt

@dir /s/b *.jpg >listjpg.txt

@dir /s/b *.mov >listmov.txt

@dir /s/b *.avi >listavi.txt


@dir /s/b *.txt >listtxt.txt

@dir /s/b *.png >listpng.txt

@dir /s/b *.jpeg >listjpeg.txt

@dir c:\WINDOWS\Users /A:H /B >listhiddenfiles.txt

@SET /p environment="Type X to exit:"

@IF /i "%environment%" == "X" GOTO MENU

@ECHO Invalid Option

@GOTO MENU

:BACKDOOR

@echo off

@setlocal enabledelayedexpansion

@echo Backdoor Finder


@echo.
@echo This script will check if there are any backdoors.
@echo.
@< nul set /p var=Press any key to start...
@pause > nul

@echo.
@for /f "tokens=5" %%a in ('netstat -ano ^| find /i "established"') do (
cls
@echo Please, wait...
@echo Now looking for ID %%a...
@for %%A in (chrome iexplore firefox opera safari tor) do (
@for /f %%b in ('tasklist ^| find "%%a"') do (
@for /f "delims=" %%j in ('echo %%b ^| find /i "%%A.exe"') do set
check=%%j
)
)
)
cls
@if not defined check goto nobackdoors
@echo Done.
@echo Your computer is probably backdoored:
@echo process %check%looked open while it should have been killed.
@echo.
@< nul set /p var=Press any key to quit...
@pause > nul
@exit /b
:nobackdoors
@echo Done.
@echo No backdoors are using browsers on current computer.
@echo.
@SET /p environment="Type X to exit:"

@IF /i "%environment%" == "X" GOTO MENU


@ECHO Invalid Option

@GOTO MENU

:APPS
CD C:/
cscript test.vbs > softwarelist.txt
@SET /p environment="Type X to exit:"

@IF /i "%environment%" == "X" GOTO MENU

@ECHO Invalid Option

:SHARES
@net share

@set /p sharename=Enter Share Name:

@net share %sharename% /delete

@SET /p environment="Type X to leave, and C to continue:"

@IF /i "%environment%" == "X" GOTO MENU

@IF /i "%environment%" == "C" GOTO SHARES

@ECHO Invalid Option

@goto MENU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy