From b427aa9ba62dcfbdc03073b6422bcc305d1b1f85 Mon Sep 17 00:00:00 2001 From: Opabinia <144001335+pentestfunctions@users.noreply.github.com> Date: Wed, 17 Jan 2024 15:17:52 +1300 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index fd7e398..fe6ef38 100644 --- a/README.md +++ b/README.md @@ -14,7 +14,7 @@ BlueDucky is a powerful tool for exploiting a vulnerability in Bluetooth devices 1. 📡 Load saved Bluetooth devices that are no longer visible but have Bluetooth still enabled. 2. 📂 Automatically save any devices you scan. -3. 💌 Send a default message ("Hello There") if no `payload.txt` is present. +3. 💌 Send messages via ducky script format to interact with devices. I've successfully run this on a Raspberry Pi 4 using the default Bluetooth module. It works against various phones, with an interesting exception for a New Zealand brand, Vodafone.