P4wnP1 icon indicating copy to clipboard operation
P4wnP1 copied to clipboard

P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.

Results 106 P4wnP1 issues
Sort by recently updated
recently updated
newest added
trafficstars

Not sure if this is a good fit, but a MITM6 payload would probably be a good idea. Just getting started looking into this repo, but it looks very promising....

I wan to know if i can connect the P4wnP1 as **USB Wifi Adapter** to Kali Linux so i can perform some attacks on network ?

In at least half of my tries, the payload grabs hashes that start with the computername instead of the username. My guess is that those hashes are from a local...

line 203 of install.sh references /home/pi/P4wnP1/boot/init_bt.sh when creating the service file. This is an issue when you don't actually install P4wnP1 to the pi's home directory. Please change to $wdir/boot/initi_bt.sh...

bug
will be implemented

The gadget names and hostname are hardcoded to a value one would not necessarily want to. Especially the gadget name set to something that recognisable will make all DLP products...

will be implemented

the install.sh script creates an autologon service (lines 228-230 if install.sh) file that is hardcoded to user pi, rather than taking the actual user the script is currently run from

https://gist.github.com/hahnstep/d56f2219a8d164c0c912c8de257fd619

The USE_HID_TEST Feature seems to be not working on OSX, as it seems like, there is only a backchannel message for Capslock. Is there an option to change the key/event?...

bug
duplicate
informative

(almost) Everyone knows about SpaceHuhn's WiFi-Ducky, and his Web Interface. I believe that P4wnP1 would benefit from something similar to this. It would be helpful for those that use it...

enhancement
community task