{"id":13540188,"url":"https://github.com/cedarctic/digispark-scripts","last_synced_at":"2025-05-15T10:02:51.011Z","repository":{"id":20304570,"uuid":"89399112","full_name":"CedArctic/DigiSpark-Scripts","owner":"CedArctic","description":"USB Rubber Ducky type scripts written for the DigiSpark.","archived":false,"fork":false,"pushed_at":"2023-02-10T05:48:02.000Z","size":487,"stargazers_count":2038,"open_issues_count":32,"forks_count":608,"subscribers_count":93,"default_branch":"master","last_synced_at":"2025-05-15T10:02:40.093Z","etag":null,"topics":["badusb","digispark","digispark-scripts","ducky-payloads","hacktoberfest","penetration-testing","scripts","sketches","usb","usb-hid","usb-rubber-ducky"],"latest_commit_sha":null,"homepage":"","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/CedArctic.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2017-04-25T19:33:30.000Z","updated_at":"2025-05-14T09:42:16.000Z","dependencies_parsed_at":"2022-07-14T12:50:03.139Z","dependency_job_id":"4079e475-2f9b-4b98-b610-2345b6be3812","html_url":"https://github.com/CedArctic/DigiSpark-Scripts","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CedArctic%2FDigiSpark-Scripts","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CedArctic%2FDigiSpark-Scripts/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CedArctic%2FDigiSpark-Scripts/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CedArctic%2FDigiSpark-Scripts/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/CedArctic","download_url":"https://codeload.github.com/CedArctic/DigiSpark-Scripts/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254319716,"owners_count":22051072,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["badusb","digispark","digispark-scripts","ducky-payloads","hacktoberfest","penetration-testing","scripts","sketches","usb","usb-hid","usb-rubber-ducky"],"created_at":"2024-08-01T09:01:42.374Z","updated_at":"2025-05-15T10:02:44.873Z","avatar_url":"https://github.com/CedArctic.png","language":"C++","readme":"![alt text](https://cdn.instructables.com/FKP/MAA2/HH2VJNW1/FKPMAA2HH2VJNW1.MEDIUM.jpg \"The DigiSpark\")\n\n# DigiSpark-Scripts\nThis is a set of hand-written DigiSpark sketches for the Arduino IDE that utilize the DigiKeyboard.h library making the DigiSpark to act as a keyboard and execute a variety of actions. If you have found a USB Rubber Ducky scipt that you want to convert to a DigiSpark sketch, you can always use digiQuack, a tool which can be found in my repositories.\n\n# Instructions\nConfigure the Arduino IDE for the DigiSpark using: https://digistump.com/wiki/digispark/tutorials/connecting or Seytonic's tutorial: https://youtu.be/fGmGBa-4cYQ. Then download one of scripts (sketches), open them with Arduino IDE, modify them if needed and upload them to the DigiSpark.\n\n# Script Descriptions\n\n- **Create_Account**: Creates a new admin account and optionally hides it\n- **DNS Poisoner**: Injects lines into the Windows hosts file and redirects URLs to wherever you want\n- **Execute_Powershell_Script**: Downloads and executes a powershell script in hidden mode\n- **Fork_Bomb**: Opens up an obfuscated windows terminal and makes it multiply itself uncontrolably causing the machine to either lock or crash\n- **Rapid_Shell**: Seamlessly executes metasploit payloads through powershell\n- **Reverse_Shell**: Opens a netcat reverse shell from a Windows machine to the host\n- **RickRoll_Update**: Plays Never Gonna Give you up while performing a fake windows update\n- **Silly_Mouse**: Switches primary and secondary mouse buttons, display mouse trails, decreases mouse speed and other mouse related pranks\n- **Talker**: Makes the computer speak out a message using powershell\n- **Wallpaper_Changer**: Downloads and applies a wallpaper via powershell.\n- **Wallpaper_Changer_macOS**: Downloads and applies a wallpaper via applescript on macOS.\n- **Wallpaper_Prank**: Takes a screenshot of the desktop, sets it as the wallpaper, hides desktop icons\n- **WiFi_Profile_Grabber**: Extracts wifi profiles and saves the csv to a USB drive\n- **WiFi_Profile_Mailer**: Writes the wireless network credentials to a csv file and emails it\n- **Window_Jammer**: Spams ALT + F4 and CTRL + W key combos to force close all active windows\n\n# See the scripts in action\n\nClick the gifs to see the full video\n\n[![Wifi Stealer](https://j.gifs.com/N9KP5v.gif)](https://www.youtube.com/watch?v=b5E0u4qNH4s)\n\n[![Wallpaper Prank](https://j.gifs.com/32r7ER.gif)](https://www.youtube.com/watch?v=yHPRZnpxvks)\n\n# Contributors\n\n- **samratashok**\n- **NassimBentarka**\n- **p0wc0w**\n- **apsecdev**\n- **BlackBoot**\n- **Michyus**\n- **Vel1khaN**\n- **slipperyavocado**\n- **bernsteining**\n\n# Resources\n\n- USB Rubber Ducky Documentation by hak5darren: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Duckyscript\n\n- Digistump DigiSpark Documentation: https://github.com/digistump/DigisparkArduinoIntegration/blob/master/libraries/DigisparkKeyboard/DigiKeyboard.h\n\n- USB Usage IDs by usb.org (page 53): http://www.usb.org/developers/hidpage/Hut1_12v2.pdf\n","funding_links":[],"categories":["\u003ca id=\"04102345243a4bcaec83f703afff6cb3\"\u003e\u003c/a\u003e硬件设备\u0026\u0026USB\u0026树莓派"],"sub_categories":["\u003ca id=\"48c53d1304b1335d9addf45b959b7d8a\"\u003e\u003c/a\u003eUSB"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcedarctic%2Fdigispark-scripts","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcedarctic%2Fdigispark-scripts","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcedarctic%2Fdigispark-scripts/lists"}