A top and side view of the zSecurity Cactus USB device, designed to perform keystroke injection attacks over Wi-Fi, featuring a sleek white design with red accents and the zSecurity logo.

ZSCactus WiFi Keystroke Injection BadUSB

$34.99

This is a badUSB device on steroids! Why you ask? well it enables you to:
– Launch normal keystroke attacks when connected to a target machine.
– Get instant access, steal credentials, browser data and even Wi-Fi passwords with a few clicks using the ready payloads .
– Run your own payloads over Wi-Fi.
– Control the mouse or inject keystrikes into the target machine over Wi-Fi.
– Start a fake Wi-Fi network or Honeypot to hijack credentials.
– Direct extraction of information (e.g. credentials) by visiting a URL.
+ Free 1 Month zSecurity Trial VIP membership.

394 in stock

Upgrade & Save!

BadUSB-C Keystroke Injection Cable

- BadUSB chip fully integrated into cable.
- Looks identical to a normal charging cable.
- HID keystroke injection capabilities.
- Undetectable by antivirus software.
- 16.5 MHz 8-bit ATtiny85 with 8KB program space.
+ Free 1 Month zSecurity Trial VIP membership.

Launch Keystroke injection / BadUSB attacks on unsuspecting targets with this inconspicuous USB-C charging cable.

 

Shipping Worldwide, dispatched within 24h of payment.

ZSCactus WiFi Keystroke Injection BadUSB

Keystroke Injection
Ready Payloads
Wi-Fi Interface
Wi-Fi Honeypot
Local Storage

Remotely inject keystrokes to execute commands, extract passwords, get a reverse shell and much more!

This essential tool is perfect for Ethical Hacking and cybersecurity enthusiasts. Order today and receive a 1-month zSecurity Trial VIP Membership for free! 

A top and side view of the zSecurity Cactus USB device, designed to perform keystroke injection attacks over Wi-Fi, featuring a sleek white design with red accents and the zSecurity logo.
A top and side view of the zSecurity Cactus USB device, designed to perform keystroke injection attacks over Wi-Fi, featuring a sleek white design with red accents and the zSecurity logo.
A top and side view of the zSecurity Cactus USB device, designed to perform keystroke injection attacks over Wi-Fi, featuring a sleek white design with red accents and the zSecurity logo.
A top and side view of the zSecurity Cactus USB device, designed to perform keystroke injection attacks over Wi-Fi, featuring a sleek white design with red accents and the zSecurity logo.

Key Features

  • Ready Payloads: Get instant remote access, steal credentials, browser data and even Wi-Fi passwords with a few clicks.
  • Keystroke Injection: Launch normal keystroke attacks when connected to a target machine.
  • Honeypot and Fake Wi-Fi Network: Start a fake Wi-Fi network or Honeypot and steal login credentials.
  • Capture Data: Get instant access, steal credentials, browser data, and even Wi-Fi passwords with a few clicks using the ready payloads.
  • Cross-Platform Compatibility: Compatible with Windows, Linux, and Mac OS.
  • Payloads Over Wi-Fi: Execute your own payloads over Wi-Fi.
  • Remote Control: Control the mouse or inject keystrokes into the target machine over Wi-Fi.
  • Direct Credential Extraction: Direct extraction of information (e.g., credentials) by visiting a URL.
  • FTP Server Data Extraction: Information extraction through a built-in FTP server.

Applications

  • Penetration Testing: Simulate USB-based attacks, including malware and keystroke injection.
  • Social Engineering: Demonstrate social engineering risks and raise user awareness.
  • Network & Data Security: Test network defenses and data loss prevention via simulated attacks.
  • Policy & Response Testing: Assess USB policy compliance and incident response readiness.

Setting up your ZSCactus

Wi-Fi Control Center

ZSCactus can be configured and controlled over Wi-Fi using a mobile-friendly web interface. Simply connect the device to a USB power supply and connect to it’s  Wi-Fi network “ZSCactus“. The default password which can be changed from the settings is “zscactus“. Once connected open up a web browser and navigate to http://192.168.1.1/ to access the control center. The default credentials are “admin” / “zscactus”.

Built-in Payloads

ZSCactus comes with 10 built-in payloads for Windows, Linux and OSX.

These payloads can be used to gain full control over the target system, steal browser data including saved passwords, steal stored Wi-Fi passwords and even download and execute any file you want!

Honeypot Mode

This mode can be used to steal login credentials. It creates a fake WiFi network that asks clients to login using their social media account to access the internet. It can also be configured to serve custom HTML pages to hook the connected clients to BeEF or steal other data.

Connect to the fake access point, disregard the login prompt and navigate to http://192.168.1.1/home to access the command center. Navigate to “Storage” and you should have a file named “honeypot-log.txt”.

Payloads

This page allows you to manage your payloads, you can upload, run or delete custom payloads.

You can also set a payload to auto run when the device is connected to a computer.

Complete your Pentesting Tool Set with our Bundle

BadUSB Silent Intrusion Kit

Save $5 with this bundle

► + Free 1 Month zSecurity Trial VIP membership.
$59.97

BadUSB Silent Intrusion Kit Plus

Save $5 with this bundle

► USB Data Blocker
► + Free 1 Month zSecurity Trial VIP membership.
$69.97

FAQ

What do you use the ZSCactus WiFi Keystroke Injection BadUSB for?

Ethical Hackers and Cybersecurity Experts use the ZSCactus WiFi Keystroke Injection BadUSB for various purposes, including simulating USB-based attacks, testing endpoint and physical security, conducting social engineering exercises, raising user awareness, and assessing incident response capabilities, among other critical security functions!

Can antivirus software detect and block ZSCactus WiFi Keystroke Injection BadUSB attacks?

BadUSB attacks operate at the firmware level, which is much harder for standard antivirus software to detect, as the device appears to the operating system as a legitimate keyboard.

Additional information

Weight0.1 kg
Dimensions10 × 10 × 1 cm
Location

Estimate Delivery Time

USA

1 – 3 working days.

Europe

3 – 10 working days.

All over the world

We ship to all countries, delivery time varies, please contact us for estimate delivery time.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.