• Get Kali
  • Blog
  • Documentation
    Documentation Pages Tools Documentation Frequently Asked Questions Known Issues
  • Community
    Community Support Forums Discord Join Newsletter Mirror Location Get Involved
  • Courses
    Kali Linux Revealed (KLCP/PEN-103) PEN-200 (PWK/OSCP) PEN-210 (WiFu/OSWP) PEN-300 (ETBD/OSEP) WEB-200 (WAWK/OSWA) WEB-300 (AWAE/OSWE) EXP-301 (WUMED/OSED) EXP-312 (MCB/OSMR) EXP-401 (AWE/OSEE) SOC-200 (OSDA)
  • Developers
    Git Repositories Packages Auto Package Test Bug Tracker Kali NetHunter Stats
  • About
    Kali Linux Overview Press Pack Kali Swag Store Meet The Kali Team Partnerships Contact Us
  • Kali NetHunter
    • Installing NetHunter
    • Installing NetHunter On the Gemini PDA
    • Installing NetHunter On the OnePlus 7
    • Installing NetHunter On the TicWatch Pro
    • Installing NetHunter On the TicWatch Pro 3
    • NetHunter Application - Terminal
    • NetHunter BadUSB Attack
    • NetHunter Bluetooth-Arsenal
    • NetHunter Chroot Manager
    • NetHunter Components
    • NetHunter Custom Commands
    • NetHunter DuckHunter Attacks
    • NetHunter Exploit Database SearchSploit
    • NetHunter HID Keyboard Attacks
    • NetHunter Home Screen
    • NetHunter Kali Services
    • NetHunter KeX Manager
    • NetHunter MAC Changer
    • NetHunter Man In The Middle Framework
    • NetHunter MANA Evil Access Point
    • NetHunter Metasploit Payload Generator
    • NetHunter Nmap Scan
    • NetHunter Rootless
    • NetHunter Social Engineer Toolkit
    • NetHunter USB-Arsenal
    • Building NetHunter
    • Porting NetHunter to New Devices manually
    • Porting NetHunter to New Devices with kernel builder
    • Patching the Kernel
    • Configuring the Kernel - General
    • Configuring the Kernel - Network
    • Configuring the Kernel - Wifi
    • Configuring the Kernel - SDR
    • Configuring the 3.x Kernel - USB
    • Configuring the 4.x Kernel - USB
    • Configuring the Kernel - NFS
    • Adding your device
    • Testing Checklist
    • Wireless Cards and NetHunter
LIGHTDARK

NetHunter DuckHunter Attacks

The DuckHunter HID option allows you to quickly and easily convert USB Rubber Ducky scripts into NetHunter HID Attacks format. You can choose an option from the Example presets menu or choose from a larger selection of preconfigured scripts at the Duck Toolkit site.

Demo Video


Updated on: 2023-Jun-16
Author: re4son


Edit this page Create a new page
NetHunter Custom Commands NetHunter Exploit Database SearchSploit
LIGHTDARK

Links

Home Download / Get Kali Blog OS Documentation Tool Documentation System Status Archived Releases

Platforms

ARM (SBC) NetHunter (Mobile)
Amazon AWS Docker Linode Microsoft Azure Microsoft Store (WSL) Vagrant

Development

Bug Tracker Continuous Integration Network Mirror Package Tracker GitLab

Community

Discord Support Forum

Follow Us

Facebook Instagram Mastodon Twitter
Newsletter RSS

Policies

Cookie Policy Privacy Policy Trademark Policy
© OffSec Services Limited 2024. All rights reserved.