🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)
Go to file
Opabinia 417ca94717
Update BlueDucky.py
2024-01-17 14:21:00 +13:00
BlueDucky.py Update BlueDucky.py 2024-01-17 14:21:00 +13:00
README.md Update README.md 2024-01-16 19:57:05 +13:00
start.png Add files via upload 2024-01-16 19:57:26 +13:00

README.md

BlueDucky

  • Will modularize it later.

  1. Running the file you will be able to load saved bluetooth devices if they are no longer visible but bluetooth is still on - so you can attack them.
  2. Any devices you scan will save
  3. If no payload.txt is present it will instead send the text "Hello There"

Duckyscript

  • I am still implementing keyboard combinations
  • Currently implemented:
    1. REM
    2. STRING

So for example (payload.txt)

REM This is a comment and will not run
STRING type this on their phone hehe