A hardware-based USB 2.0 monitor & trigger platform, controlled from Python

Aug 09, 2019

Project update 1 of 6

The Campaign is Live!

by Colin O'Flynn

PhyWhisperer-USB is here! We’ve recently launched our campaign for PhyWhisperer-USB, the open-source tool for triggering and sniffing USB. What can you do with this tool? While it was created out of Colin O’Flynn’s research he talked about at Black Hat USA, and also described in more detail in a paper in WOOT‘19. The PhyWhisperer-USB makes it easy to perform advanced attacks on USB devices, by giving you a cycle-accurate trigger to precisely target instruction execution.

We decided that this is something we’re doing in some form no matter what, so we’ve set a $1 goal. But supporting this project now helps us with the initial production run & tells us what features people are most interested in. They’re also a bit discounted from the final retail price. We’ll keep you updated with new developments and examples throughout the campaign.

Thanks for your support & be sure to share with anyone else who might be interested!

Sign up to receive future updates for PhyWhisperer-USB.

Subscribe to the Crowd Supply newsletter, highlighting the latest creators and projects