ScriptKitty Firmware

The Cat-Themed Keystroke Injection Tool!

ScriptKitty is a cat-themed keystroke injection tool that lets you select hundreds of usb attack payloads at the press of a button. You can even deploy attacks remotely via a WiFi interface!

Get the source code and binaries here.

ScriptKitty Introduction

Flash Drive

The ScriptKitty Firmware creates a flash drive when plugged into your computer. This makes it easy to drag and drop new payloads over - or exfiltrate files from a target device!

This is where you can also modify the configuration file.

Payload Organization

You’ll notice that payloads are organized by Operating System, and Sub-categories on the flash drive. Since you don’t know what types of systems you’ll encounter in the wild, you can have hundreds ready to deploy at the press of a button!

Try out one of our example prank payloads for your target operating system… they’re harmless ;)

Running An Attack

Use the D-Pad to navigate the on-screen interface. You’ll notice it matches the folder / file structure on your ScriptKitty flash drive!

Use the UP/DOWN buttons to scroll through the current directory. Use LEFT to enter a directory or run a file. RIGHT will take you back!

Try out the RickRoll payload for your target operating system.

Add New Payloads

Adding new payloads is as simple as dragging & dropping them over to the USB Drive! Payload must end in .txt extension and are written in DuckyScript. Check out our payload guide to learn the syntax!

Thanks to Hak5, hundreds of payloads are already developed & ready to deploy. Check out their repo for inspiration! Only USB RubberDucky Payloads are compatible at the moment.

Emulate USB Devices

By default, the ScriptKitty Firmware emulates an Apple Keyboard to bypass MacOS flagging non-Apple keyboards.

You can easily modify the type of device it emulates by editing the config.txt file on the flash drive! All you have to do is edit the VID and PID parameter - which correspond to Vendor ID and Product ID respectively.

You can use a USB vendor lookup tool like this open database to choose a device to emulate.

On Linux / Mac you can check if this worked using:

lsusb

On Windows, check your Device Manager!