LOGITacker icon indicating copy to clipboard operation
LOGITacker copied to clipboard

Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.

Results 36 LOGITacker issues
Sort by recently updated
recently updated
newest added

Hi @all Sorry the title is not very explicite...and my approximative english... I test your wonderfull tool since one week. After de pairing (good RF adress + Key) > First,...

When I am connect with `$ screen / dev / ttyACM0 19200` , I am immediately spammed with INFO messages because LOGITacker starts with auto discovery. How can i stop...

I have successfully deployed covert_channel to my device and when I issue command : covert_channel connect xx:xx:xx:xx:xx I get the following returned: please specify a subcommand. Am using latest 0.2.3-beta...

Is it available to sniff raw nrf24 frames for unknown devices without changing code of toolkit? Or can you add it to TODO list?

Hello it's me again, I've managed to inject commands on Windows machines and it works like a charm. Then I tried to inject on Linux but nothing happens. I get...

Compilation wasn't working with the latest nRF5 SDK (v16.0.0)

This feature will allow to stop discover mode. It has been tested and should work properly.

Hey, another thought that might improve things in a noisy environment, maybe its worth implementing. I have honestly no idea for the different supported hardware how much memory is available...

When running the `!sharplock` command on a Windows 10 victim machine, the fake login "Form1" window is displayed in front of all other windows, however the last focused window remains...

I believe it would be fairly simple to change the code for coveetchannel payloads (sharplocker atm is ‘hardcoded’. Since the payload is executed by a simple powershell base64 encoded string,...