Skip to content

jtmarrin/iOS18-Payloads

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Hak5 Ducky Scripts for iOS 18 with o.mg C to C Cable

Overview

This repository contains a collection of Hak5 Ducky scripts specifically designed for use with the o.mg C to C cable on devices running iOS 18. These scripts are tailored to exploit specific features of iOS 18 for security research purposes.

Disclaimer

  • For Educational and Research Purposes Only: These scripts are provided strictly for security research and educational purposes. Use of these scripts on devices without explicit permission from the device owner is illegal and unethical.
  • No Warranty: These scripts are provided "as is" without warranty of any kind. Use at your own risk.
  • Legal Compliance: Ensure you comply with all local, state, and federal laws regarding computer security and privacy.

Usage Notes

  • iOS Version Specific: These scripts are optimized for iOS 18. Using them on other versions might result in unexpected behavior or failure to execute commands correctly.
  • Cable Specific: Designed for use with the o.mg C to C cable. Different cables might not yield the same results due to hardware differences.
  • Obfuscation: Some payloads include obfuscation techniques to prevent misuse. This might require additional setup or deobfuscation for testing or educational purposes.

Known Issues

  • Compatibility: Not all scripts might work with future or past iOS versions due to changes in security protocols or UI interactions.
  • Timing Issues: Scripts might require adjustment of timing parameters for different hardware or software configurations.

Remember: Responsible use of these tools is crucial. Unauthorized access to devices is illegal and unethical.

About

o.mg cable iOS Payloads updated for iOS 18

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors