Skip to content

Releases: dfyR433/USB_Ware

v1.0.7

10 Dec 09:31
3286edb

Choose a tag to compare

Fixed CTRL ATL

v1.0.6

20 Oct 15:34
02a158a

Choose a tag to compare

New Ducky Script v3


Bin installation (clean, step-by-step)

Steps

  1. Open the Spacehuhn Web Flasher → https://esptool.spacehuhn.com/ in your browser.

  2. Connect the ESP32 to your computer via USB.

  3. Click Connect on the web interface and choose the correct serial port for your device.

  4. Upload the .bin files from your PC to the matching flash addresses:

    • bootloader.bin0x1000
    • partitions.bin0x8000
    • USB_Ware.bin0x10000
  5. Click Program.

  6. Wait until the tool reports the process finished successfully.

  7. Reset the device manually (press RESET or unplug/replug power).


Common problems & fixes

  • Flashing fails / timeout: try another USB cable (power-only cables fail), switch USB port, or install proper USB drivers.
  • Tool can’t find port: on Linux, check dmesg or ls /dev/tty* to identify the correct device. On Windows use Device Manager.
  • Bootloop after flashing: verify you used the right partitions file and correct flash size/mode. Re-flash bootloader.bin + partitions.bin first.
  • “Invalid head” / CRC errors: re-download .bin files — they might be corrupted.
  • Manual boot/flash mode: if auto-reset doesn’t work, put the ESP32 into bootloader mode manually: hold BOOT (or GPIO0) while resetting/powering on (exact buttons depend on board).

v1.0.5

09 Oct 13:08
63d04ac

Choose a tag to compare

New Custom Ducky Script Feature


How to use (web UI)

  1. Connect to the ESP32 AP and open the web UI.
  2. Navigate to the new Custom feature page (or choose feature=custom from the main form).
  3. Paste your DuckyScript into the large textarea.
  4. Click Run to execute immediately.

Examples

Open Notepad, type text

GUI r
DELAY 200
STRING notepad
DELAY 200
ENTER
DELAY 500
STRING Hello from USB Ware!
ENTER

Open Chrome to a URL (Rickroll example)

GUI r
DELAY 200
STRING chrome
DELAY 200
ENTER
DELAY 500
STRING https://www.youtube.com/watch?v=dQw4w9WgXcQ
ENTER

v1.0.4

07 Oct 13:49
8e2b359

Choose a tag to compare

New Features

  • Wi‑Fi AP hosted configuration portal (defaults in Configs.h).

  • Minimal web UI (neon terminal look) for triggering features:

    • Ping Site — opens a target URL (defaults to a YouTube Rickroll).
    • Python Script — types a multi-line PowerShell block which saves and runs a Python script (educational encrypt/decrypt demo).
    • Script + Ping — runs the Python script then opens the URL.
    • Barrel Roll — opens a Google query that triggers the barrel-roll animation.
    • Notepad — opens Notepad and types a short message.
    • All — run all enabled actions (sequence depends on the sketch).
  • HID utilities implemented in USB_Tools.h including typed input, combos, opening Run dialog, switching windows, and more.

v1.0.0

19 Aug 21:13
56bcf25

Choose a tag to compare

USB_Ware

Project Description

  • This project leverages the native USB capabilities of ESP32-S2/S3 boards to emulate a USB HID keyboard device.
  • It automatically injects a Python script into a connected Windows host via a hidden PowerShell window.
  • The injected script performs secure encryption or decryption of files located on the user's Desktop.

Requirements

  • Target Machine:

    • Windows OS with PowerShell installed (default on Windows 11 and later)
    • Python 3.x installed and accessible via the python command
    • Internet connection to install Python packages if missing
  • Host Development:

    • Arduino IDE 1.8.19 or later
    • Arduino IDE
    • ESP32 Arduino core (latest recommended)

By: dfyR433
Platform: ESP32-S2 / ESP32-S3 (Native USB HID)
Languages: Arduino (C++) and Python


v1.0.3

19 Aug 21:17
950be45

Choose a tag to compare

USB_Ware v1.0.3

Board: ESP32-S2 (native USB)
License: MIT (educational use only)

USB_Ware is an educational USB/HID toolkit designed for ESP32-S2. It demonstrates captive portals, automated typing, and controlled brute-force PIN attacks in a safe lab environment.


Features

Captive Portal

  • ESP32-S2 acts as an Access Point (AP) and redirects all DNS queries to itself.
  • Includes three themed demo pages:
    • Minimal
    • Corporate-style
    • Neon

Android PIN Cracker (Brute-Force Demo)

  • Brute-force a 6-digit PIN for instructional purposes.

HID Payloads

  • Typing simulation with adjustable delays.
  • Script execution via SPIFFS or embedded payloads.
  • Optional “Rickroll” YouTube prank.

Configurable Settings

All key settings are configurable in the code.


Full Code Configuration

// ================= User Settings =================

// Select feature:
// Options:
// "richroll"           -> Rickroll YouTube prank
// "captive_portal"     -> Launch captive portal with DNS redirection
// "script"             -> Execute embedded HID scripts
// "script_richroll"    -> Script + Rickroll
// "barrel_roll"        -> Barrel roll animation/demo
// "note"               -> Type notes automatically
// "brute_force"        -> Android PIN brute force demo
// "all-brute_force"    -> All except brute force
const char* feature = "richroll";

// Brute-force delay in milliseconds per attempt
int bruteDelay = 100;

// Captive portal Wi-Fi AP settings
String inputSSID = "Captive portal";  // SSID
String inputPASS = "12345678";       // Password (leave empty for open network)
String portalName = "super portal";  // Portal name (super portal, super google, super pass)

// Encryption/Decryption mode: "e" = encrypt, "d" = decrypt
const char* MODE = "e";

// Target folder inside user profile (Desktop, Documents, Downloads, etc.)
const char* TARGET_FOLDER_NAME = "Desktop";

// Typing delay multiplier (affects HID typing speed)
float Delay = 40.0;

// YouTube URL for Rickroll payload
const char* linkURL = "https://www.youtube.com/watch?v=dQw4w9WgXcQ";

//--------------------------------------------------

v1.0.2

19 Aug 21:15
666937a

Choose a tag to compare

New HID Payloads


🚀 New Features

  • 🧩 Modular Modes: Run Python script, Barrel Roll, Rickroll, Notepad in any order.
  • 👻 Hidden Python Script: safe_dual_mode.py in user profile.
  • 📦 Auto Dependency: Installs cryptography if missing.
  • 🔑 Key Management: Saves key + backup, prevents overwriting.
  • 📊 Progress Bar: Real-time encryption/decryption progress.
  • Reliable Execution: Adjustable typing speed for all commands.
  • 🎉 Interactive Effects: Combine fun effects sequentially.
  • Typing Speed Control: Fine-tune globally with speed variable.

⚙️ Quick Usage

  1. Program Mode (program):
    "richroll" | "script" | "barrelroll" | "note" | "all" | "all-script"

  2. Python Mode (MODE): "e" = encrypt | "d" = decrypt

  3. Target Folder (TARGET_FOLDER_NAME): "Desktop" / "Documents"

  4. Upload & Run: Plug ESP32 into Windows machine.


💡 Designed for safe educational demos.

v1.0.1

19 Aug 21:14
666937a

Choose a tag to compare

USB_Ware

This project uses an ESP32-S2/S3 (or other ESP board with native USB HID support) to inject a Python script via USB HID keyboard emulation. The Python script encrypts or decrypts files in a specified folder on a Windows PC.


Features

  • USB HID injection via ESP32-S2/S3 or similar ESP with native USB.
  • Automatically types and runs a Python script on Windows.
  • Encrypts or decrypts all files in a chosen folder (e.g., Desktop, Documents).
  • Auto-installs required Python library (cryptography) if missing.
  • Saves encryption key with backup.
  • Displays progress during operation.
  • Saves the Python script as a hidden file on the target PC.
  • Configurable mode: Encrypt ("e") or Decrypt ("d").
  • Adjustable typing speed for injection.

Supported Hardware

  • ESP32-S2 or ESP32-S3 development boards with native USB HID capability.
  • Any ESP board capable of USB HID keyboard emulation.

Supported Operating System

  • Windows (with Python installed and accessible from command line).

Usage

  1. Set MODE to "e" or "d" in the source code.
  2. Set speed to control typing delay (minimum recommended: 10.0).
  3. Specify the target folder name (e.g., "Desktop", "Documents").
  4. Compile and upload the firmware to your ESP device.
  5. Connect the ESP device to the Windows PC; it will auto-inject the script and run it.

Requirements

  • Python 3 installed on the target Windows PC.
  • cryptography Python library will be installed automatically if missing.

Disclaimer

This tool is for educational and authorized testing only. Unauthorized use is prohibited and may be illegal.


License

MIT License.


Contact

Created by dfyR433

For questions or contributions, please open an issue or pull request.