Flipper/BadUSB/MacOS-narstybits
2023-08-08 21:59:16 -07:00
..
Executions Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
Goodusb Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
Obscurity Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
Pranks Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
RECON Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
Executions Readme.md Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
GoodUSB Readme.md Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
Obscurity Readme.md Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
README.md Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
RECON Readme.md Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00
Warning Readme.md Added submodule back in (raw files) 2023-08-08 21:59:16 -07:00

<head> </head>

Image Description

This repository is EXCLUSIVE to MacOs BADUSB Scripts Giphy Image Coding
Giphy Image

🔹 They are Plug & Play 🔹

Acknowledgements

A big shoutout and huge thanks to these amazing contributors:

Xremote (Cross Remote)

Check out the Xremote project by leedave to chain Infrared and SubGHz together! 📱

Evil Portal

Check out the 😈 🇪 🇻 🇮 🇱 🇵 🇴 🇷 🇹 🇦 🇱 😈 project by bigbrodude6119 An evil captive portal Wi-Fi access point using the Flipper Zero and Wi-Fi dev board!

For Educational Purposes Only! (This project should teach you why its important to NEVER use an Unauthorized Accesspoint)

MacOs Flipper Zero Collection

  • MacOs Flipper Zero Collection
  • NEWEST FLIPPER Zero SCRIPT

How 2 Flipper Guide

If you're a visual learner like me, check out this detailed tutorial by wrenchathome:

🔹Step by Step Directions to Get You Up and Running🔹

🔹 First, Always Read the Remarks

Coding

When working with the scripts, make sure to carefully read the REM (remark) lines. REMs explain the purpose of each line or provide instructions to the user. It's crucial to always read and understand the REMs!

🔹The VendorID and ProductID Combination

Coding
'ID 05ac:021e Apple:Keyboard'

This code helps the operating system identify the specific device (in this case, the Flipper Zero) and load the appropriate drivers or configurations, such as for an Apple keyboard.

🔹The 'ignorespace' Option

Coding
'echo -e "export HISTCONTROL=ignorespace\nunset HISTFILE" >> ~/.bashrc && source ~/.bashrc && exec bash'

This code enables the 'ignorespace' option for the command history, preventing commands with a leading space from being stored in the shell history. Special thanks to FalsePhilosopher for helping create this string!

🔹Removing Specific Commands from History

Coding
history -d $(history | tail -n 2 | head -n 1 | awk '{ print $1 }')

This code removes the specific command from the history, ensuring minimal traces are left behind and helping maintain discretion and privacy.

🔹 Step by Step Directions

1 Download the Files: Start by downloading the necessary files from the repository to your desktop.

2 Prepare Flipper: Plug your Flipper into your computer and navigate to the SD card.

3 Transfer Files: Open the File Manager and locate the BADUSB folder on the SD card. Drag and drop the downloaded files into the BADUSB folder.

4 Finalize: Close the Flipper desktop app and ensure the files have been successfully transferred.

5 Ready to Go!: Your Flipper is now ready to deploy the BADUSB DuckyScripts and unleash its power! Enjoy the experience and have fun exploring the possibilities! 🚀

🔹 Support Narstybits 🔹
Coding
If my work has brought a smile to your face or sparked joy in your heart, I wouldn't say no to a little digital love.

Donate with Bitcoin

Please exercise caution and responsibility when using the scripts and tools in the "executions," "obscurity," "pranks," "GOODUSB," and "Recon" folders. These scripts are intended for educational and ethical purposes such as penetration testing, security testing, and network testing. However, it is important to note that unauthorized or malicious use of these tools can be illegal and may lead to severe consequences.

It is your responsibility to ensure that you have appropriate authorization, permissions, and legal rights to perform any security testing activities on computer systems or networks. Always respect the law, adhere to ethical guidelines, and obtain proper consent before conducting any tests or assessments.

Remember, it is crucial to prioritize legal and ethical practices, protect user privacy, and use these tools responsibly to improve security and protect against real-world threats.