sajithgairuka / Attiny85-Attacks

Attiny85 based attacks (RubberDucky)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

DISCLAIMER

2831777

This repository's software/scripts/applications/things are provided "as is," with no warranties of any kind. You use these software/scripts/applications/things at your own risk. The creator of these softwares/scripts/applications/things is not liable for any direct or indirect damage to your or someone else's property as a result of using these softwares/scripts/applications/things.

DigiSpark Attiny85 RubberDucky

Attiny85 based attacks

pctdetail 775-056 1

Environment Setup

I recommend going to digistump.com to learn how to set up a development environment for the Attiny85.

  • Attacker Machine { For Reverse Shell --> guide Link } : Kali Linux
  • Victime Machine : Windows 7 / windows 10

Bypass Techniques (Windows 10) 💀

winver

security

☠️ To bypass the security use "powershell -command invoke-item $env:UserProfile\desktop\wow.exe" instead "powershell -command i'n'vo'k'e-it'e'm $env:UserProfile\desktop\wow.exe" ☠️

About

Attiny85 based attacks (RubberDucky)


Languages

Language:C++ 100.0%