ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

Rubber Ducky script - BADUSB - Steal PWD with powershell


  • Please log in to reply
Rubber Ducky script - BADUSB - Steal PWD with powershell

#1

ABSK
ABSK
    Offline
    0
    Rep
    5
    Likes

    Member

  • PipPipPip
Posts: 52
Threads: 4
Joined: Jan 27, 2016
Credits: 0
Eight years registered
#1

Hello,

I just want to share with you a little script for a rubber ducky that permit to use your rubber ducky as a BadUsb and steal password !
 

Hidden Content
You'll be able to see the hidden content once you reply to this topic or upgrade your account.


  • 0

#2

SugarBabe
SugarBabe
    Offline
    2
    Rep
    1
    Likes

    New Member

Posts: 15
Threads: 2
Joined: Mar 08, 2018
Credits: 10

Six years registered
#2

While this is interesting it's not very useful as the passwords can't really be used for anything.

Maybe add something that grabs browser passwords to the script. Should be fairly easy. I'll try to write something up later tonight.


  • 0

#3

christianh61
christianh61
    Offline
    0
    Rep
    0
    Likes

    Member

  • PipPipPip
Posts: 40
Threads: 0
Joined: Feb 25, 2018
Credits: 0
Six years registered
#3

Thanks for the share my friend


  • 0

#4

eiurfhe88rhfier
eiurfhe88rhfier
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 3
Threads: 0
Joined: Nov 11, 2018
Credits: 0
Five years registered
#4

ty


  • 0

#5

Deppkopf88
Deppkopf88
    Offline
    0
    Rep
    0
    Likes

    New Member

  • PipPip
Posts: 23
Threads: 0
Joined: Oct 04, 2020
Credits: 0
Three years registered
#5
PandaLikes

  • 0

#6

Daulat
Daulat
    Offline
    0
    Rep
    0
    Likes

    Member

Posts: 57
Threads: 0
Joined: Mar 19, 2021
Credits: 0

Three years registered
#6

great


  • 0

#7

maff3
maff3
    Offline
    0
    Rep
    0
    Likes

    Member

Posts: 28
Threads: 0
Joined: Jul 20, 2022
Credits: 0
One year registered
#7

hmm


  • 0


 Users browsing this thread: