USB Rubber Ducky Payloads
๐ฅ Offensive Ops ยท DuckyScript
USB Rubber Ducky Payloads is a repository containing a wide range of keystroke injection scripts for USB Rubber Ducky and BadUSB devices. These scripts are designed to automate various attack scenarios by simulating keystrokes when the device is connected to a target system. Used extensively in penetration testing and security demonstrations, these payloads exploit the inherent trust in Human Interface Devices (HID) to execute malicious commands.
Use Cases
- Keystroke injection attacks via USB devices
- Physical access exploitation in red team ops
- Automated credential harvesting payloads
- Reverse shell deployment via HID attacks
- Security awareness demonstrations
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- DuckyScript
- Repository
- hak5/usbrubberducky-payloads
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
More in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.