This repository contains a collection of Hak5 Ducky scripts specifically designed for use with the o.mg C to C cable on devices running iOS 18. These scripts are tailored to exploit specific features of iOS 18 for security research purposes.
- For Educational and Research Purposes Only: These scripts are provided strictly for security research and educational purposes. Use of these scripts on devices without explicit permission from the device owner is illegal and unethical.
- No Warranty: These scripts are provided "as is" without warranty of any kind. Use at your own risk.
- Legal Compliance: Ensure you comply with all local, state, and federal laws regarding computer security and privacy.
- iOS Version Specific: These scripts are optimized for iOS 18. Using them on other versions might result in unexpected behavior or failure to execute commands correctly.
- Cable Specific: Designed for use with the o.mg C to C cable. Different cables might not yield the same results due to hardware differences.
- Obfuscation: Some payloads include obfuscation techniques to prevent misuse. This might require additional setup or deobfuscation for testing or educational purposes.
- Compatibility: Not all scripts might work with future or past iOS versions due to changes in security protocols or UI interactions.
- Timing Issues: Scripts might require adjustment of timing parameters for different hardware or software configurations.
Remember: Responsible use of these tools is crucial. Unauthorized access to devices is illegal and unethical.