{"id":29634168,"url":"https://github.com/linuxndroid/bluetooth-ducky","last_synced_at":"2026-04-19T02:02:59.585Z","repository":{"id":305657784,"uuid":"1023506696","full_name":"Linuxndroid/Bluetooth-Ducky","owner":"Linuxndroid","description":"Bluetooth Ducky is a stealthy HID injection tool built on the ESP32 platform. It emulates a Bluetooth keyboard to silently inject keystrokes into a paired device.","archived":false,"fork":false,"pushed_at":"2025-07-22T10:33:24.000Z","size":30,"stargazers_count":11,"open_issues_count":1,"forks_count":5,"subscribers_count":0,"default_branch":"main","last_synced_at":"2025-10-06T13:26:14.302Z","etag":null,"topics":["ble-device","blueducky","bluetooth","ducky-payloads","esp32","esp32-ducky","esp32-wroom","hacker","hacking","hid","hid-attacks","hid-injection","linuxndroid","mrrobot","rubber-ducky"],"latest_commit_sha":null,"homepage":"","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Linuxndroid.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2025-07-21T09:07:20.000Z","updated_at":"2025-09-25T01:26:46.000Z","dependencies_parsed_at":"2025-07-21T11:39:13.254Z","dependency_job_id":null,"html_url":"https://github.com/Linuxndroid/Bluetooth-Ducky","commit_stats":null,"previous_names":["linuxndroid/bluetooth-ducky"],"tags_count":1,"template":false,"template_full_name":null,"purl":"pkg:github/Linuxndroid/Bluetooth-Ducky","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Linuxndroid%2FBluetooth-Ducky","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Linuxndroid%2FBluetooth-Ducky/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Linuxndroid%2FBluetooth-Ducky/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Linuxndroid%2FBluetooth-Ducky/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Linuxndroid","download_url":"https://codeload.github.com/Linuxndroid/Bluetooth-Ducky/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Linuxndroid%2FBluetooth-Ducky/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":31991720,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-18T20:23:30.271Z","status":"online","status_checked_at":"2026-04-19T02:00:07.110Z","response_time":55,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ble-device","blueducky","bluetooth","ducky-payloads","esp32","esp32-ducky","esp32-wroom","hacker","hacking","hid","hid-attacks","hid-injection","linuxndroid","mrrobot","rubber-ducky"],"created_at":"2025-07-21T15:13:02.542Z","updated_at":"2026-04-19T02:02:59.580Z","avatar_url":"https://github.com/Linuxndroid.png","language":"C++","readme":"# 🔐 Bluetooth Ducky ESP32 -  HID Injection Tool\n\n![Platform](https://img.shields.io/badge/platform-ESP32-blue)\n![License](https://img.shields.io/badge/license-MIT-green)\n![Status](https://img.shields.io/badge/status-active-brightgreen)\n\nBluetooth Ducky is a stealthy HID injection tool built on the ESP32 platform. It emulates a Bluetooth keyboard to silently inject keystrokes into a paired device. Perfect for red team operations, security research, and automation — all done **wirelessly**.\n\n\u003e ⚠️ **Disclaimer**: This project is for educational and authorized testing purposes only. Unauthorized use may violate laws. Use responsibly.\n\n---\n\n## ✨ Features\n\n- ✅ Bluetooth HID (keyboard) emulation via ESP32  \n- ✅ Auto-pairing support for previously connected devices  \n- ✅ Ducky Script-style payloads (easily customizable)  \n- ✅ Trigger via boot or over Serial  \n- ✅ Supports Windows, macOS, Linux, and Android  \n- ✅ Lightweight, portable, and easy to use  \n\n---\n\n## 📦 Requirements\n\n- [Arduino IDE Portable](https://www.arduino.cc/en/software)\n- ESP32 Dev Board (e.g., ESP32-WROOM-32)  \n- Micro USB Cable  \n- BLE Keyboard Library ([ESP32-BLE-Keyboard](https://github.com/T-vK/ESP32-BLE-Keyboard))\n\n---\n\n## 🔧 Installation\n\n1. **Install the ESP32 Board in Arduino IDE**  \n   - Go to `File \u003e Preferences`  \n   - Add the following URL to *Additional Board Manager URLs*:  \n     ```\n     https://raw.githubusercontent.com/espressif/arduino-esp32/gh-pages/package_esp32_index.json\n     ```\n   - Go to `Tools \u003e Board \u003e Boards Manager`, search `esp32` and install V.2.0.7\n\n2. **Install BLE Keyboard Library**  \n   - Download the library ZIP: [ESP32-BLE-Keyboard](https://github.com/T-vK/ESP32-BLE-Keyboard/archive/refs/heads/master.zip)  \n   - In Arduino IDE, go to `Sketch \u003e Include Library \u003e Add .ZIP Library...`  \n   - Select the downloaded ZIP file.\n\n3. **Select the Board and Port**  \n   - Go to `Tools \u003e Board \u003e ESP32 Dev Module`  \n   - Select the correct COM port under `Tools \u003e Port`\n\n4. **Open and Edit the Code**  \n   - Open `Ducky.ino` in Arduino IDE  \n   - Customize the payload as needed \n\n5. **Upload to ESP32**  \n   - Click ✅ **Verify** then ⬆️ **Upload**  \n   - Once uploaded, disconnect and power it externally\n\n---\n\n## 🚀 How to Use\n\n1. **Power the ESP32 device**  \n   It will start broadcasting as a Bluetooth keyboard.\n\n2. **Wait for the Victim to Pair**  \n   On first use, the victim must accept the pairing.  \n   After this, the ESP32 will auto-connect silently in the future.\n\n3. **Payload Execution**  \n   Once connected, the predefined script will automatically run and execute on the victim’s machine.\n\n---\n\n## 📥 Downloads\n\nESP32 Serial Monitor GUI?\n\n➡️ **Download it from the [Releases](https://github.com/Linuxndroid/Bluetooth-Ducky/releases)** section.\n\nThe monitor app allows you to:\n- Send serial commands to your ESP32 device\n- View real-time logs and responses\n- Trigger payloads manually\n- Customize interaction with your Bluetooth Ducky tool\n\n\u003e Available for **Windows (.exe)** — more platforms coming soon.\n\n## 💻 Available Serial Commands\n\nUse these commands via the Serial Monitor or GUI Monitor App:\n\n| Command | Action |\n|--------|--------|\n| `notepad` | Open Notepad |\n| `youtube \u003csearch\u003e` | Search \u0026 open YouTube |\n| `google \u003csearch\u003e` | Search \u0026 open Google |\n| `whatsapp \u003cno\u003e \u003cmsg\u003e` | Send WhatsApp message |\n| `wp-ss \u003cno\u003e` | Send screenshot via WhatsApp |\n| `cmd` | Open Command Prompt |\n| `shutdown` | Shutdown PC in 5 seconds |\n| `run` | Open Run dialog (Win + R) |\n| `url \u003ccommand\u003e` | Execute command in Run box |\n| `lock` | Lock the PC |\n| `close` | Close current app |\n| `ENTER` | Press Enter key |\n| `screenshot` | Take a screenshot |\n| `CTRL+\u003ckey\u003e` | Press CTRL with a key (e.g., `CTRL+A`) |\n| `WIN`, `LEFT`, `RIGHT`, `UP`, `DOWN` | Arrow or Win keys |\n| `WiFi` | Dump saved Wi-Fi passwords |\n| `Fake` | Show fake system update |\n| `Spam` | Display spam alert box |\n| `help` | Show all commands |\n| `About` | Show creator info |\n\n## 👤 Creator Info\n\nCreated by:  \n**Linuxndroid** \u0026 **Krishna Rajput UP61**\n\n🔗 Stay connected for updates, demos, and new tools!\n\n---\n\n## 🛡️ Legal Notice\n\nThis tool is intended **only for authorized use** in testing, education, or red teaming.  \nMisuse without consent is strictly prohibited and may violate laws.\n\n---\n\n## 📄 License\n\nThis project is licensed under the [MIT License](LICENSE).\n\n---\n\n## ❤️ Credits\n\n- ESP32 BLE Keyboard Library by [T-vK](https://github.com/T-vK/ESP32-BLE-Keyboard)  \n- Inspired by USB Rubber Ducky and other open-source red team tools\n\n---\n\n\u003cbr\u003e\n\n# Watch Video For More Information.\n[![YouTube Video](https://img.youtube.com/vi/up9fcNwsiqg/0.jpg)](https://youtu.be/up9fcNwsiqg?feature=shared)\n\n\u003cp align=\"center\"\u003eMade with ❤️ By \u003ca href=\"https://www.youtube.com/channel/UC2O1Hfg-dDCbUcau5QWGcgg\"\u003eLinuxndroid\u003c/a\u003e\u003c/p\u003e\n\n# Available Our [Hacking Course](https://linuxndroid.in)\n\n# Follow Me on :\n\n[![Instagram](https://img.shields.io/badge/IG-linuxndroid-yellowgreen?style=for-the-badge\u0026logo=instagram)](https://www.instagram.com/linuxndroid)\n\n[![Youtube](https://img.shields.io/badge/Youtube-linuxndroid-redgreen?style=for-the-badge\u0026logo=youtube)](https://www.youtube.com/channel/UC2O1Hfg-dDCbUcau5QWGcgg)\n\n[![Browser](https://img.shields.io/badge/Website-linuxndroid-yellowred?style=for-the-badge\u0026logo=browser)](https://www.linuxndroid.in)\n\n## 🧪 Example Payloads\n\n```cpp\ndelay(1000);                        // Wait 1 second\ntypeSlow(\"https://www.instagram.com/linuxndroid\");   // Type message\nbleKeyboard.write(KEY_RETURN);      // Press Enter\n\n\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flinuxndroid%2Fbluetooth-ducky","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Flinuxndroid%2Fbluetooth-ducky","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flinuxndroid%2Fbluetooth-ducky/lists"}