GitHub - hak5/usbrubberducky-payloads: The Official USB Rubber Ducky Payload Repository
Applied Sciences | Free Full-Text | Data Exfiltration through Electromagnetic Covert Channel of Wired Industrial Control Systems
Here's a List of 29 Different Types of USB Attacks
Azure Sentinel Query—Monitor USB data Exfiltration
Ninja Ducky Toolkit - cheap and secure data exfiltration via USB implants - Bob McKay's Blog
data-exfiltration · GitHub Topics · GitHub
The Week that Was: Chinese threat actor hit US organizations with a Microsoft cloud exploit. Training code turns out to be malicious in a new proof-of-concept attack discovered on GitHub.
Copy Files from an Unlocked Computer In Seconds w/ the Bash Bunny | HakByte - YouTube
Anyway to save files back to the Flipper using BadUSB? - BadUSB - Flipper Community
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Change Desktop Wallpaper with a USB Rubber Ducky | Scattered Code
malware-as-a-service Archives - Security Affairs
Payloads Tagged "USB Rubber Ducky" Page 3 - Hak5
Combating Data Exfiltration Attempts with Proofpoint 7.7 | Proofpoint US
Code42 Incydr Detects Source Code Exfiltration from Git to Unsanctioned Repositories | Business Wire
USB devices the common denominator in all attacks on air-gapped systems - Urgent Comms
Hack The Box - Hack The Boo CTF Writeups | Mukarram Khalid
Data Exfiltration (Tunneling) Attacks against Corporate Network – Pentest Blog
Writing Keystroke Injection Payloads for the Bash Bunny - Bash Bunny