Evil Crow cable is a BadUSB device based on Attiny85 microcontroller with data line enabled
Evil Crow BadUSB Cable is an information security and penetration testing tool that looks and functions just like a regular USB cable (both power and data) until a wireless remote control triggers it to deliver your choice of attack payload to the host machine. In essence, Evil Crow is the next step in the evolution of BadUSB, embedding the attack in the USB cable itself.
Emulating keyboard and mouse actions, payloads can be completely customized and can be highly targeted. Undetectable by firewalls, AV software (**depending on payload of course**) or visual inspection, the Evil Crow Cable is an ideal tool for penetration testers, police and government.
For more information you can read the following repository:
- Demo video: //twitter.com/JoelSernaMoreno/status/1181296289323130882?s=19
You can get payloads in the following repository:
Idea: Joel Serna & Ernesto Sánchez
Development and implementation: Joel Serna & Ernesto Sánchez
PCB design: AprilBrother
Manufacturer and distributor: AprilBrother
Other collaborators: Ignacio Díaz & Forensic Security, Innovart & Jorge Mata, Roland Santiago, Luca Bongiorni, Marcus Mengs, Mike Groover…
Evil Crow cable is a BadUSB device based on Attiny85 microcontroller with data line enabled. For more information you can read the following repository:
Evil Crow Cable is a basic device for professionals and cybersecurity enthusiasts. This device was developed to show security breaches in USB peripherals.
AprilBrother and the collaborators of this project are not responsible for the incorrect use of Evil Crow cable.
We recommend using this device for testing, learning and fun