Hacking ▍

Ducky Script · Deep Dive · 18 volumes

Ducky Script

Hak5's payload language — from "hello world" to OS-specific attack chains.

The little keystroke-injection scripting language with disproportionate impact.

Search every volume:

Volumes

  1. Vol 1 Ducky Script Volume 1 — Overview: Keystroke Injection, the Device Family, and the Decision Tree What a Ducky Script payload actually is, the HID trust model it abuses, the four Hak5 devices that run it, and how to read this 18-volume manual
  2. Vol 2 Ducky Script Volume 2 — History & Generations The 2010 origin, the Rubber Ducky hardware lineage, Ducky Script 1.0 → 3.0, and how the language spread across the device family
  3. Vol 3 Ducky Script Volume 3 — The Language Core Ducky Script 1.0 — the foundation every device and every payload is built on: syntax, STRING, DELAY, REM, key names, and modifiers
  4. Vol 4 Ducky Script Volume 4 — Ducky Script 3.0: The Structured Language VAR and the operator set, IF/ELSE conditionals, WHILE loops, FUNCTIONs, and the DEFINE preprocessor
  5. Vol 5 Ducky Script Volume 5 — Smart Payloads: Detection, Jitter & Timing Discipline OS detection, reading the host's keyboard-lock state, jitter, randomization, and the timing discipline that makes a payload reliable instead of lucky
  6. Vol 6 Ducky Script Volume 6 — Exfiltration & ATTACKMODE Using the device as more than a typist — ATTACKMODE, USB identity spoofing, Keystroke Reflection, and HIDE_PAYLOAD
  7. Vol 7 Ducky Script Volume 7 — Keyboard Layouts: The Cross-Locale Problem Why a payload that 'ran' typed garbage, what scan codes really are, and the discipline for payloads that survive an unknown layout
  8. Vol 8 Ducky Script Volume 8 — The USB Rubber Ducky The canonical device — Mark I and Mark II hardware, the button/LED/microSD workflow, and why it is the reference the whole family is measured against
  9. Vol 9 Ducky Script Volume 9 — The Bash Bunny A full Linux box that also injects keystrokes — ATTACKMODE, QUACK, the bash payload environment, and multi-vector attacks
  10. Vol 10 Ducky Script Volume 10 — The Key Croc The observe-then-act device — a keylogger that passes keystrokes through, logs them, and fires payloads on a keyword or regex match
  11. Vol 11 Ducky Script Volume 11 — The O.MG Family: Cable, Plug & Adapter The covert implants — hidden in a charging cable or wall plug, fully functional as the thing they look like, triggered remotely over Wi-Fi
  12. Vol 12 Ducky Script Volume 12 — The Encode & Deploy Workflow Getting a payload from a text file onto each device — Payload Studio (the official editor) with usage tips, the encoders, per-device deploy, and testing discipline
  13. Vol 13 Ducky Script Volume 13 — Payload Patterns, Worked Examples & the Payload Hub The structures real payloads are built from, worked per-device examples, and how to use the Hak5 payload repositories safely
  14. Vol 14 Ducky Script Volume 14 — Combined-Device & Combined-Tool Workflows Staging the four devices together, staging Ducky Script alongside the WiFi Pineapple, Hak5 Cloud C2, and multi-stage engagements
  15. Vol 15 Ducky Script Volume 15 — Defense & Detection How keystroke injection is actually caught — USB device control, HID allow-listing, behavioural and timing detection, and the blue-team view
  16. Vol 16 Ducky Script Volume 16 — Operational Posture: Legal, Ethics & OPSEC The framing for a technique that is intrusive by definition — the authorization artifact, the weight of install-and-leave implants, and the discipline that keeps the device family on the right side of the line
  17. Vol 17 Ducky Script Volume 17 — Device Comparison & Which-to-Use-When The four owned device families side by side, and a setup-per-job guide for the recon job, the smash-and-grab, the persistent implant, and the keylog-and-trigger
  18. Vol 18 Ducky Script Volume 18 — Cheatsheet The whole manual compressed — the language, the four devices, the deploy steps, the patterns, the decision tree, and the posture checklist