The Official USB Rubber Ducky Payload Repository
-
Updated
Dec 12, 2024 - PowerShell
The Official USB Rubber Ducky Payload Repository
The Official Hak5 Shark Jack Payload Repository
Libvirt evdev input service
Fast & Silent Script For Rubber Ducky To Inject Reverse Shell
A very simple payload designed to exfiltrate Wi-Fi network names and passwords of a Microsoft Windows operating system, utilizing webhooks for exfiltration.
Wireless keystroke injection attack platform # WifiDuck
an undetected (by windows defender, AMSI, and malwarebytes) powershell reverse shell based off of hoaxshell - with firewall bypass
Python libraries and ros2 nodes to control the angle of several dynamixels motors on several u2d2 interfaces with hotplug capabilities.
Alpine Linux on WSL2 dev environment setup
Gets you the available thread count, without caching; handy for systems and hot-plugging cpus; merged into Docker.
Add a description, image, and links to the hotplug topic page so that developers can more easily learn about it.
To associate your repository with the hotplug topic, visit your repo's landing page and select "manage topics."