Skip to content
A statistically optimized USB rubber ducky payload to brute force 4-digit Android PINs.
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
README.md
inject.bin
pinlist.txt

README.md

#Droidbrute An Android PIN cracking USB rubber ducky payload made efficient with a statistically generated wordlist.

##What it does Cracks the password on Android devices with an insecure 4-digit PIN set. The script is a USB rubber duck payload that emulates a keyboard to type in the most statistically common 4-digit PINs. By working from most common PIN to least common the speed at which the phone can be cracked is greately increased.

##Prerequisites

##Video ScreenShot

##Credit Wordlist was taken from this Defcon talk I attended: https://www.defcon.org/html/defcon-21/dc-21-speakers.html#Engler

You can’t perform that action at this time.