Skip to content

hackeringtrue/PicoBadUSB

Repository files navigation

🦆 Atom Ducky – BadUSB Toolkit

Atom Ducky is a portable, customizable BadUSB device built using the Raspberry pi pico w. It can emulate keyboard input (HID) and run scripted payloads like a Rubber Ducky.

🔧 Features

  • GUI Web interface for payload control
  • Inject DuckyScript/HID payloads
  • Live keystroke simulation
  • Template manager
  • Rubber mode
  • Setup and configuration UI
  • Built-in prank and testing payloads

🧪 Getting Started

📥 Requirements

  • Raspberry pi pico w
  • Micro USB cable
  • Chrome/Firefox (for Web UI)

🛠️ Flash the Device

  1. Download and flash the flash_nuke.uf2 or boot.py as needed.
  2. Copy the following files to the root of the Raspberry pi pico w drive:
    • index.html
    • static/
    • atoms/
    • code.py
    • settings.toml

📡 Accessing the Web Interface

  1. Connect to Atom’s AP or plug it via USB.
  2. Navigate to: ip in config file .
  3. You’ll see the GUI interface to configure and launch payloads. You can send payloads like this from the UI.

🧙‍♂️ Credits

  • Developed by HackeringTrue

  • Inspired by Hak5 Rubber Ducky and public repo

▶️ Watch the demo video

👨‍💻 Author

Hackering True
Cybersecurity Researcher & Malware Analyst
🌐 GitHub Profile
💼 LinkedIn


About

BadUSB project based on Raspberry pi pico w

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published