Atom Ducky is a portable, customizable BadUSB device built using the Raspberry pi pico w. It can emulate keyboard input (HID) and run scripted payloads like a Rubber Ducky.
- GUI Web interface for payload control
- Inject DuckyScript/HID payloads
- Live keystroke simulation
- Template manager
- Rubber mode
- Setup and configuration UI
- Built-in prank and testing payloads
- Raspberry pi pico w
- Micro USB cable
- Chrome/Firefox (for Web UI)
- Download and flash the
flash_nuke.uf2
orboot.py
as needed. - Copy the following files to the root of the Raspberry pi pico w drive:
index.html
static/
atoms/
code.py
settings.toml
- Connect to Atom’s AP or plug it via USB.
- Navigate to: ip in config file .
- You’ll see the GUI interface to configure and launch payloads. You can send payloads like this from the UI.
-
Developed by HackeringTrue
-
Inspired by Hak5 Rubber Ducky and public repo
Hackering True
Cybersecurity Researcher & Malware Analyst
🌐 GitHub Profile
💼 LinkedIn