A collection of USB Rubber Ducky payloads for Raspberry Pi Pico, designed for educational and security research purposes.
IMPORTANT: These payloads are provided for educational purposes only. Unauthorized use of these payloads on systems you do not own or have explicit permission to test is illegal and unethical.
These payloads have been tested on a Raspberry Pi Pico running the USB Rubber Ducky firmware.
Before using any payload:
- Change all
payload.txtfiles topayload.dd(required for Raspberry Pi Pico) - Review and customize the payload scripts according to your needs
- Ensure you have proper authorization before testing on any system
Category: Execution
Target: Windows 10/8
Creates a new administrator user account on Windows systems. The payload:
- Opens PowerShell with elevated privileges
- Creates a new user account (default:
duckwith passwordpassword) - Adds the user to the Administrators group
- Hides the user from the login screen
- Cleans up execution traces
Customization: You can change the username and password in the payload script.
Category: Exfiltration
Target: Windows 10
Extracts and stores WiFi passwords from the target system. The payload:
- Executes a PowerShell script to retrieve saved WiFi credentials
- Stores the passwords on the USB device (check
ss.ps1to modify the output directory)
Note: Modify ss.ps1 to change the output directory where passwords are stored.
3. rotateScreen
Category: Prank
Target: Windows 10
Continuously rotates the monitor screen at specified intervals. The payload:
- Executes PowerShell scripts to rotate the display
- Can be configured to rotate at custom time intervals
- Includes a script to minimize windows during rotation
Customization: Modify the delay in dd.ps1 (1 second = 1000 milliseconds) to change rotation timing.
Category: Information Gathering
Target: Windows 10
Collects comprehensive system information and saves it to the USB device. The payload:
- Gathers operating system details (version, build, architecture)
- Collects hardware information (CPU, RAM, manufacturer, model)
- Retrieves network adapter configurations (IP addresses, MAC addresses, DNS servers)
- Lists local user accounts and their status
- Captures running processes (top 20 by CPU usage)
- Records installed software (recent installations)
- Collects disk information (size, free space, usage)
- Saves all information to a timestamped text file on the USB device
Customization: Modify the drive letter in the payload script (default: D:\) if your USB device uses a different drive. The script automatically detects alternative drive letters if the default is unavailable.
-
Clone this repository:
git clone https://github.com/mickeyhousee/usbrubberducky-payloads.git
-
Navigate to the desired payload directory
-
Rename
payload.txttopayload.dd(if applicable) -
Review and customize the payload script as needed
-
Upload the
payload.ddfile to your Raspberry Pi Pico -
Test responsibly and only on systems you own or have explicit permission to test
- Raspberry Pi Pico with USB Rubber Ducky firmware
- Target system: Windows 8/10 (varies by payload)
- Administrative privileges may be required for some payloads
This repository and its contents are provided for educational and security research purposes only. The authors and contributors are not responsible for any misuse or damage caused by these payloads. Users are solely responsible for ensuring they have proper authorization before using these tools on any system.
This project is provided as-is for educational purposes. Use at your own risk.
Contributions are welcome! Please ensure that:
- All payloads include proper documentation
- Payloads are tested and functional
- Security warnings and disclaimers are included
- Code follows the existing structure and naming conventions