Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

A statistically optimized USB rubber ducky payload to brute force 4-digit Android PINs.

Notifications You must be signed in to change notification settings

mandatoryprogrammer/droidbrute

Open more actions menu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
2 Commits
 
 
 
 
 
 

Repository files navigation

#Droidbrute An Android PIN cracking USB rubber ducky payload made efficient with a statistically generated wordlist.

##What it does Cracks the password on Android devices with an insecure 4-digit PIN set. The script is a USB rubber duck payload that emulates a keyboard to type in the most statistically common 4-digit PINs. By working from most common PIN to least common the speed at which the phone can be cracked is greately increased.

##Prerequisites

##Video ScreenShot

##Credit Wordlist was taken from this Defcon talk I attended: https://www.defcon.org/html/defcon-21/dc-21-speakers.html#Engler

About

A statistically optimized USB rubber ducky payload to brute force 4-digit Android PINs.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
Morty Proxy This is a proxified and sanitized view of the page, visit original site.