narstybits / MacOS-DuckyScripts

Presenting a wide range of more than 100 powerful BadUSB scripts exclusively designed for Mac OS & the Flipper Zero device. As the sole curator and maintainer of this repository. Your utilization of these scripts is highly valued, and I sincerely appreciate your support and enthusiasm!
https://github.com/narstybits/MacOS-DuckyScripts.git
339 stars 24 forks source link
badusb badusb-payloads bash-script ducky-payloads duckyscript flipper flipper-zero flipperzero pentesting security-testing

<!DOCTYPE html>

Image Description

<h1 align="center">This repository is EXCLUSIVE to MacOs BADUSB Scripts Giphy Image

Coding

Giphy Image
## 🔹 They are Plug & Play 🔹

Acknowledgements

A big shoutout and huge thanks to these amazing contributors:

Xremote (Cross Remote)

Check out the Xremote project by leedave to chain Infrared and SubGHz together! 📱

Evil Portal

Check out the 😈 🇪 🇻 🇮 🇱 🇵 🇴 🇷 🇹 🇦 🇱 😈 project by bigbrodude6119 An evil captive portal Wi-Fi access point using the Flipper Zero and Wi-Fi dev board!

For Educational Purposes Only! (This project should teach you why its important to NEVER use an Unauthorized Accesspoint)

MacOs Flipper Zero Collection

How 2 Flipper Guide

If you're a visual learner like me, check out this detailed tutorial by wrenchathome:

🔹Step by Step Directions to Get You Up and Running🔹

🔹 First, Always Read the Remarks

Coding

When working with the scripts, make sure to carefully read the REM (remark) lines. REMs explain the purpose of each line or provide instructions to the user. It's crucial to always read and understand the REMs!

🔹The VendorID and ProductID Combination

Coding
'ID 05ac:021e Apple:Keyboard'

This code helps the operating system identify the specific device (in this case, the Flipper Zero) and load the appropriate drivers or configurations, such as for an Apple keyboard.

🔹The 'ignorespace' Option

Coding
'echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash'

This code enables the 'ignorespace' option for the command history, preventing commands with a leading space from being stored in the shell history. Special thanks to FalsePhilosopher for helping create this string!

🔹Removing Specific Commands from History

Coding
history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }')

This code removes the specific command from the history, ensuring minimal traces are left behind and helping maintain discretion and privacy.

🔹 Step by Step Directions

1️⃣ Download the Files: Start by downloading the necessary files from the repository to your desktop.

2️⃣ Prepare Flipper: Plug your Flipper into your computer and navigate to the SD card.

3️⃣ Transfer Files: Open the File Manager and locate the BADUSB folder on the SD card. Drag and drop the downloaded files into the BADUSB folder.

4️⃣ Finalize: Close the Flipper desktop app and ensure the files have been successfully transferred.

5️⃣ Ready to Go!: Your Flipper is now ready to deploy the BADUSB DuckyScripts and unleash its power! Enjoy the experience and have fun exploring the possibilities! 🚀

<h1 align="center">🔹 Support Narstybits 🔹

Coding
If my work has brought a smile to your face or sparked joy in your heart, I wouldn't say no to a little digital love.

Donate with Bitcoin

Coding


⚠️ IMPORTANT DISCLAIMER ⚠️

❗️ Please exercise caution and responsibility when using the scripts and tools in the "executions," "obscurity," "pranks," "GOODUSB," and "Recon" folders. These scripts are intended for educational and ethical purposes such as penetration testing, security testing, and network testing. However, it is important to note that unauthorized or malicious use of these tools can be illegal and may lead to severe consequences.

❗️ It is your responsibility to ensure that you have appropriate authorization, permissions, and legal rights to perform any security testing activities on computer systems or networks. Always respect the law, adhere to ethical guidelines, and obtain proper consent before conducting any tests or assessments.

❗️ Remember, it is crucial to prioritize legal and ethical practices, protect user privacy, and use these tools responsibly to improve security and protect against real-world threats.