Skip to content

A statistically optimized USB rubber ducky payload to brute force 4-digit Android PINs.

Notifications You must be signed in to change notification settings

mandatoryprogrammer/droidbrute

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

#Droidbrute An Android PIN cracking USB rubber ducky payload made efficient with a statistically generated wordlist.

##What it does Cracks the password on Android devices with an insecure 4-digit PIN set. The script is a USB rubber duck payload that emulates a keyboard to type in the most statistically common 4-digit PINs. By working from most common PIN to least common the speed at which the phone can be cracked is greately increased.

##Prerequisites

##Video ScreenShot

##Credit Wordlist was taken from this Defcon talk I attended: https://www.defcon.org/html/defcon-21/dc-21-speakers.html#Engler

About

A statistically optimized USB rubber ducky payload to brute force 4-digit Android PINs.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published