• Get Kali
  • Blog
  • Documentation
    Kali Linux Documentation Kali Tools Documentation Known Issues
  • Community
    Community Support Kali Linux Forums Real Time Chat Join Newsletter Mirror Location Get Involved
  • Courses
    Kali Linux Revealed (KLCP/PEN-103) PEN-200 (PWK/OSCP) PEN-210 (WiFu/OSWP) PEN-300 (ETBD/OSEP) WEB-200 (WAWK/OSWA) WEB-300 (AWAE/OSWE) EXP-301 (WUMED/OSED) EXP-312 (MCB/OSMR) EXP-401 (AWE/OSEE) SOC-200 (AWE/OSDA)
  • Developers
    Git Repositories Packages Auto Package Test Bug Tracker Kali NetHunter Stats
  • About
    Kali Linux Overview Gallery & Press Pack Meet The Kali Team Partnerships & Friends Contact Us
  • Kali NetHunter
    • Installing NetHunter
    • Installing NetHunter On the Gemini PDA
    • Installing NetHunter On the OnePlus 7
    • Installing NetHunter On the TicWatch Pro
    • Installing NetHunter On the TicWatch Pro 3
    • NetHunter Application - Terminal
    • NetHunter BadUSB Attack
    • NetHunter Bluetooth-Arsenal
    • NetHunter Chroot Manager
    • NetHunter Components
    • NetHunter Custom Commands
    • NetHunter DuckHunter Attacks
    • NetHunter Exploit Database SearchSploit
    • NetHunter HID Keyboard Attacks
    • NetHunter Home Screen
    • NetHunter Kali Services
    • NetHunter KeX Manager
    • NetHunter MAC Changer
    • NetHunter Man In The Middle Framework
    • NetHunter MANA Evil Access Point
    • NetHunter Metasploit Payload Generator
    • NetHunter Nmap Scan
    • NetHunter Rootless
    • NetHunter USB-Arsenal
    • Building NetHunter
    • Porting NetHunter to New Devices manually
    • Porting NetHunter to New Devices with kernel builder
    • Patching the Kernel
    • Configuring the Kernel - General
    • Configuring the Kernel - Network
    • Configuring the Kernel - Wifi
    • Configuring the Kernel - SDR
    • Configuring the 3.x Kernel - USB
    • Configuring the 4.x Kernel - USB
    • Adding your device
    • Testing Checklist
    • Wireless Cards and NetHunter
LIGHTDARK

NetHunter DuckHunter Attacks

The DuckHunter HID option allows you to quickly and easily convert USB Rubber Ducky scripts into NetHunter HID Attacks format. You can choose an option from the Example presets menu or choose from a larger selection of preconfigured scripts at the Duck Toolkit site.

Demo Video


Updated on: 2021-Dec-02
Author: re4son


 Edit this page
NetHunter Custom Commands NetHunter Exploit Database SearchSploit
LIGHTDARK

Downloads

Kali Linux Kali NetHunter

Links

Home Blog Documentation Tools Support Forum Bug Tracker System Status

Policies

Cookie Policy Privacy Policy Trademark Policy

Follow Us

Twitter Facebook GitLab GitHub Microsoft Store Docker Vagrant Amazon AWS RSS
© OffSec Services Limited 2022. All rights reserved.