Have you watched movies where a hacker gets into the victim's computer and steals data from them?
Liability Disclaimer: This project is for security research purposes only.
Although this project focuses on codes access of WiFi, the code it contains could easily be changed to do something worse. You're only limited by your imagination (and your technical skills).
Settings
After building pico-ducky, you only need to copy the modified code (you can change the SMTP details for Windows exploit, the code linux access and one name of the USB drive) to the RPi Pico.
Prerequisites
Physical access to the victim's computer.
Victim's unlocked computer.
The victim's computer must have access to the Internet to send the stolen data using it protocol SMTP.
You will need to know the password of the victim's computer for the Linux exploit.
Requirements – What you will need
Raspberry Pi Pico (RPi Pico)
Micro USB to USB cable
Jumper Wire (optional)
pico-ducky – Turn your RPi Pico into a USB Rubber Ducky
USB flash drive (for physical media exploits only)
More details and how to on the project page
With the other person's computer unlocked, if you want, you open cmd and press netconfig or something similar and it throws you the code, you don't need a whole process with USB...