The Official USB Rubber Ducky Payload Repository
-
Updated
Nov 8, 2024 - PowerShell
The Official USB Rubber Ducky Payload Repository
The Official Hak5 Shark Jack Payload Repository
Libvirt evdev input service
Fast & Silent Script For Rubber Ducky To Inject Reverse Shell
A very simple payload designed to exfiltrate Wi-Fi network names and passwords of a Microsoft Windows operating system, utilizing webhooks for exfiltration.
an undetected (by windows defender, AMSI, and malwarebytes) powershell reverse shell based off of hoaxshell - with firewall bypass
Wireless keystroke injection attack platform # WifiDuck
Python libraries and ros2 nodes to control the angle of several dynamixels motors on several u2d2 interfaces with hotplug capabilities.
Gets you the available thread count, without caching; handy for systems and hot-plugging cpus; merged into Docker.
Add a description, image, and links to the hotplug topic page so that developers can more easily learn about it.
To associate your repository with the hotplug topic, visit your repo's landing page and select "manage topics."