Spectre takes Diabolic Drive's wireless keystroke-injection mechanism to a whole new level. Previously, when connected to a computer, Diabolic Drive would present simultaneously as an HID interface and as a 64-GB flash drive. This design was already cutting edge, in terms of evading detection, because a flash drive is precisely what one would expect to see when plugging in a device like this. But now, rather than entering the "active" state immediately when inserted, Diabolic Drive defaults to the "spectre" state, which presents only as a flash drive...right up until you deem it safe to expose the HID interface and begin injecting keystrokes, at which point you can initiate the attack remotely over a Wi-Fi connection! Until then, the HID interface will remain completely dormant, with no unexpected behavior to detect and no abnormal logs generated. And Spectre is compatible with Diabolic Drive's other stealth features, as well, so you can still hide the Arduino bootloader, spoof VIDs and PIDs, etc. This update includes a proof-of-concept video demonstration that shows Spectre in action! Read the full update.
We've made some changes to the campaign, with exciting updates coming soon. Read the full update.
This will be a quick update about USB Type-C support for the Diabolic Drive. Read the full update.
Check out the ways you can use Diabolic Drive as a Wi-Fi deauthentication attack tool Read the full update.
Learn about all the enclosures that work with Diabolic Drive Read the full update.
Learn about how the Diabolic Drive works and what makes it so unique Read the full update.