Back to Flipper

NullSec BadUSB Collection

BadUSB/NullSec-BadUSB/README.md

latest3.3 KB
Original Source

NullSec BadUSB Collection

<p align="center"> </p>

A comprehensive collection of BadUSB payloads for the Flipper Zero, designed for penetration testing and security research.

📁 Payload Categories

🔍 Reconnaissance

PayloadTargetDescription
01_SystemRecon.txtWindowsEnumerate system info, users, processes, network
08_NetworkScan.txtWindowsDiscover network hosts and services
21_LinuxRecon.txtLinuxLinux system reconnaissance
23_MacOSRecon.txtmacOSmacOS system enumeration

🔑 Credential Extraction

PayloadTargetDescription
02_WiFiStealer.txtWindowsExtract saved WiFi passwords
05_CredDump.txtWindowsDump cached credentials
06_BrowserData.txtWindowsExtract browser history, cookies, passwords
09_SAMDump.txtWindowsDump SAM database (requires admin)

🐚 Remote Access

PayloadTargetDescription
03_ReverseShell.txtWindowsPowerShell reverse shell
22_LinuxReverseShell.txtLinuxBash reverse shell
24_DownloadExecute.txtWindowsDownload and execute remote payload

🛡️ Defense Evasion

PayloadTargetDescription
04_DisableDefender.txtWindowsDisable Windows Defender
10_Persistence.txtWindowsRegistry run key persistence
25_CreateAdmin.txtWindowsCreate hidden admin account

�� Data Exfiltration

PayloadTargetDescription
07_Keylogger.txtWindowsInstall PowerShell keylogger
12_WebcamSnap.txtWindowsCapture webcam image
13_ClipboardStealer.txtWindowsMonitor clipboard contents
14_ScreenCapture.txtWindowsTake screenshot
15_USBExfil.txtWindowsCopy documents to USB

😈 Pranks (Harmless)

PayloadTargetDescription
11_FakeUpdate.txtWindowsFake Windows update screen
16_RickRoll.txtWindowsClassic RickRoll
17_WallpaperPrank.txtWindowsChange wallpaper
18_VoicePrank.txtWindowsText-to-speech prank
19_DisableMouse.txtWindowsTemporarily disable mouse
20_InvertScreen.txtWindowsInvert display colors

⚙️ Usage

  1. Copy desired payload to your Flipper Zero's badusb folder
  2. Navigate to BadUSB on your Flipper
  3. Select the payload
  4. Connect to target device
  5. Execute

⚠️ Disclaimer

These payloads are provided for educational and authorized security testing purposes only.

  • Only use on systems you own or have explicit permission to test
  • Never use for malicious purposes
  • The author is not responsible for misuse

📜 License

MIT License - Use responsibly!