Teensy like a rubber ducky , why im choose teensy ? because the price very cheap for me . t’s extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK ) .When you insert the device, it will be detected as a keyboard, and using the microprocessor and onboard flash memory storage, you can send a very fast set of keystrokes to the target’s machine and completely compromise it, regardless of autorun. I’ve used it in my security testing to run recon or enumeration scripts, execute reverse shells, exploit local DLL hijack/privilege escalation vulnerabilities, and get all password . Now im develop new tools the name is Brutal
Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device
- If this project very help you to penetration testing and u want support me , you can give me a cup of coffee :)
-
Check this video https://www.youtube.com/watch?v=WaqY-pQpuV0
-
Do you want like a mr robot hacking scene when Angela moss plug usb into computer for get credential information ? you can choose payload in brutal ( optional 3 or 4 )
-
Generate various payload and powershell attack without coding
-
To help breaking computer very fast and agile :p
-
The Payloads Compatibility > target Windows machines only
-
Arduino Software ( I used v1.6.7 )
-
TeensyDuino
-
Linux udev rules
-
How install all requirements ? Visit This Wiki
The following hardware has been tested and is known to work.
-
Teensy 3.x
-
Usb Cable
Be sure to check out the [Changelog] and Read CHANGELOG.md
Copy and paste the PaensyLib folder inside your Arduino\libraries
git clone https://github.com/Screetsec/Brutal.git
cd Brutal
chmod x Brutal.sh
sudo ./Brutal.sh or sudo su ./Brutal.sh
- Submit new issue
- Contact me
- Hey sup ? do you want ask about all my tools ? you can join me in telegram.me/offscreetsec
-
Donation: Send to bitcoin
-
Addres Bitcoin : 1NuNTXo7Aato7XguFkvwYnTAFV2immXmjS
- Thanks to allah and Screetsec [ Edo -maland- ]
- Dracos Linux from Scratch Indonesia ( Awesome Penetration os ), you can see in http://dracos-linux.org/
- Offensive Security for the awesome OS ( http://www.offensive-security.com/ )
- http://www.kali.org/
- Jack Wilder admin in http://www.linuxsec.org
- And another open sources tool in github
- Uptodate new tools hacking visit http://www.kitploit.com
Note: modifications, changes, or alterations to this sourcecode is acceptable, however,any public releases utilizing this code must be approved by writen this tool ( Edo -m- ).