Home - a3rd/USB-Rubber-Ducky GitHub Wiki
USB Rubber Ducky Project Wiki
About
Following the success of the USB Switchblade, the attack platform that was super effective against local Windows targets, the Hak5 community has developed a new kind of attack -- this time cross platform (Windows, Mac, Linux) -- which achieves deadly results by posing as an ubiquitous keyboard.
The USB Rubber Ducky isn't your ordinary HID (Human Interface Device). Coupled with a powerful 60 MHz 32-bit processor and a simple scripting language anyone is able to craft payloads capable of changing system settings, opening back doors, retrieving data, initiating reverse shells, or basically anything that can be achieved with physical access -- all automated and executed in a matter of seconds.
- Cross-Platform: Attacks any OS that supports USB Keyboards
- Simple Scripting language: Start writing payloads in minutes
- Open Source Firmware: Add functionality using included libraries
- Expandable Storage: Micro SD cards make it possible to carry multiple payloads
- Community Support: Share sample scripts, complete payloads and get help online
Resources
- Product Page at the HakShop
- Message Board at the Hak5 Forums
- Duckuino - Encode DuckyScript into code for the Arduino Leonardo
- DuckyScript - The Rubber Ducky Scripting Language
- Payloads -> * My First Payload
- Tutorials - How-To guides
- Hardware
- Downloads - Duckencoder and Firmware releases
- Deprecated USB Rubber Ducky Wiki - Outdated