A curated set of agents with a shared permission & risk profile.
Pack Z is intentionally not enabled. The download is a “receipt” bundle: the meme + a manifest stub.
pack.json + each agent stub.Scans the physical area for Bluetooth Low Energy (BLE) devices (Phones, Fitbits, Headphones). Shows you what hardware is nearby.
Spins up a temporary web server that hosts a secret message. Once the message is viewed one time, the server immediately shuts down and deletes the evidence.
Monitors the clipboard in the background. Whenever the content changes (user copies text), it logs the content to a file with a timestamp.
Traces an IP address to a physical location (City, Country, ISP, Lat/Long) using the ip-api.com service.
Hooks into the OS input stream and records every key pressed to a local log file.
Creates a "Polyglot" file—a single file that is a valid JPG image and a valid ZIP archive at the same time. You can view it as a picture, or unzip it to reveal hidden files.
A Playwright script configured to evade basic bot detection. It modifies navigator properties and randomization to look like a real human user.
Hides a secret text message inside the pixels of a PNG image. The image looks normal to the naked eye, but the message can be recovered by this agent later.
Silently activates the connected webcam, takes a snapshot, and saves it. No preview window, no flash (usually).
Simulates a Deauthentication attack logic (sending termination packets) without actually transmitting radio signals (safe mode). Used to demonstrate how simple these scripts are.
Uses OS commands (netsh on Windows, security on Mac) to retrieve the saved password for a known WiFi network.