All Projects → Skazza94 → FakeUSB

Skazza94 / FakeUSB

Licence: other
Make your own BadUSB device!

Programming Languages

C++
36643 projects - #6 most used programming language
c
50402 projects - #5 most used programming language
CMake
9771 projects

Projects that are alternatives of or similar to FakeUSB

node-beagle-boot
A node.js USB bootloader server for BeagleBone for booting it into mass storage mode
Stars: ✭ 17 (+21.43%)
Mutual labels:  beaglebone-black, usb
VISAInstrument
基于NI-VISA/VISA32(Virtual Instrument Software Architecture)的仪器编程(C#),支持RS232、USB、GPIB及LAN通信接口的收发控制
Stars: ✭ 132 (+842.86%)
Mutual labels:  usb
azalea
main board for the GreatFET project, also known as GreatFET One
Stars: ✭ 52 (+271.43%)
Mutual labels:  usb
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (+171.43%)
Mutual labels:  cybersecurity
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (+1742.86%)
Mutual labels:  cybersecurity
8821au-20210708
Linux Driver for USB WiFi Adapters that are based on the RTL8811AU and RTL8821AU Chipsets - v5.12.5.2
Stars: ✭ 40 (+185.71%)
Mutual labels:  usb
FPGA-USB-Device
FPGA-based USB-device controller to implement USB-CDC, USB-HID, etc.
Stars: ✭ 29 (+107.14%)
Mutual labels:  usb
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (+78.57%)
Mutual labels:  cybersecurity
aeacus
🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (+271.43%)
Mutual labels:  cybersecurity
CTF-Writeups
Repository of my CTF writeups
Stars: ✭ 25 (+78.57%)
Mutual labels:  cybersecurity
nrf52-keyboard
A BLE & 2.4G Keyboard Firmware using nrf52810/52811/52832
Stars: ✭ 101 (+621.43%)
Mutual labels:  usb
usbmon
List and monitor USB devices connected to Linux host. Also as Collectd plugin.
Stars: ✭ 28 (+100%)
Mutual labels:  usb
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+3742.86%)
Mutual labels:  cybersecurity
MiniNT5-Tools
small Windows 10 (based on Windows PE) with customised tools
Stars: ✭ 34 (+142.86%)
Mutual labels:  usb
EvilUSB
Quick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (+135.71%)
Mutual labels:  usb
domfind
A Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (+57.14%)
Mutual labels:  cybersecurity
mkosxinstallusb
Linux shell script that creates USB flash drive booting OS X installer
Stars: ✭ 34 (+142.86%)
Mutual labels:  usb
usblockout
USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.
Stars: ✭ 52 (+271.43%)
Mutual labels:  usb
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (+242.86%)
Mutual labels:  cybersecurity
ccid-utils
A USB smartcard driver including GSM SIM and EMV credit/debit card development platforms
Stars: ✭ 37 (+164.29%)
Mutual labels:  usb

FakeUSB - Make your own BadUSB device!

What is this?

This project was done for my university thesis about Cybersecurity. We needed a tool to test our USB Firewall (built using USBProxy and a BeagleBone Black).

This tool is based on USBProxy (and needs a BeagleBone Black), but instead of waiting for a real device on the "slave port", it emulates an USB device, which is described by its Descriptors (located into the config folder).

If you use a keyboard or a mouse, you can also make a script with some actions which will be ran when the fake device is connected and recognized by the host.

Basic example

fakeusb -a keyboard -d keyboard

Will run the keyboard script (located in the attack folder) using a fake keyboard device.

Available Devices

Current available devices are:

  • keyboard: emulates a keyboard
  • mouse: emulates a mouse
  • multimedia: emulates keyboard + mouse
  • mass-storage: emulates a mass storage device

Available Commands

Available commands for attack scripts are:

  • Keyboard
    • WRITE(EP) "string": writes the string string as if it has beed typed on the keyboard
    • PRESS_KEYS(EP) KEY1+KEY2+KEY3: simulates a keyboard shortcut (max 3 chars) (ex. ALT+F4 or CTRL+ALT+CANC)
  • Mouse
    • CLICK(EP) KEY: simulates a click of the key KEY on the mouse
    • MOVE(EP) X,Y: moves the pointer to X pixels horizontal and Y pixels vertical
    • MOVE_AND_CLICK(EP) KEY X,Y: simulates a drag & drop
  • Generic
    • DELAY(EP) TIME: waits TIME ms before sending the next command

EP is the IN endpoint which we want to use to send our commands.

Those commands can be used only with keyboards or mice. You can find some examples in the attack folder.

Other Info

  • You can see this tool in action in this video, while it tries to bypass our USB Firewall.
  • More info about Design and Implementations can be found in my thesis chapter (in Italian): link.
  • No, I won't do a documentation (in English) for this because I'm lazy.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].