Have you watched movies where a hacker gets into the victim's computer and steals data from them?
Liability Disclaimer: This project is for security research purposes only.
Although this project focuses on WiFi passwords, the code it contains could easily be changed to do something more malicious. You're only limited by your imagination (and your technical skills).
Settings
After building pico-ducky, you only need to copy the modified code (you can change the SMTP details for the Windows exploit, the Linux password and a USB drive name) to the RPi Pico.
Prerequisites
Physical access to the victim's computer.
Victim's unlocked computer.
The victim's computer must have Internet access to send the stolen data using the SMTP protocol.
You will need to know the password of the victim's computer for the Linux exploit.
Requirements – What you will need
Raspberry Pi Pico (RPi Pico)
Micro USB to USB cable
Jumper Wire (optional)
pico-ducky – Turn your RPi Pico into a USB Rubber Ducky
USB flash drive (for physical media exploits only)
More details and how to on the project page
With the other person's computer unlocked, if you want, you open cmd and press netconfig or something similar and it throws you the code, you don't need a whole process with USB...