BadUSB-C keystroke injection cable disguised as a standard black USB to micro-USB charging cable

BadUSB-C Keystroke Injection Cable

$29.99

– BadUSB chip fully integrated into cable.
– Looks identical to a normal charging cable.
– HID keystroke injection capabilities.
– Undetectable by antivirus software.
– 16.5 MHz 8-bit ATtiny85 with 8KB program space.
+ Free 1 Month zSecurity Trial VIP membership.

Launch Keystroke injection / BadUSB attacks on unsuspecting targets with this inconspicuous USB-C charging cable.

 

Out of stock

Shipping Worldwide, dispatched within 24h of payment.

BadUSB-C Keystroke Injection Cable

HID Keystroke Injection
Undetectable by Antivirus
Identical to a Charging Cable
Multi-Platform Compatibility
16.5 MHz 8-bit with 8kb space.

This is not your ordinary charging cable! This is a BadUSB Keystroke Injection cable, made for Ethical Hacking and Cybersecurity enthusiasts. This USB-C charging cable looks identical to a normal charging cable, the only difference is it can execute keystroke injection attacks when connected to a computer!

It automatically registers itself as a keyboard and sends pre-configured key-strikes (payloads) to the machine that it is connected to, allowing you to execute a large number of attacks to harvest information or even gain full control over the target device. The ATtiny85 is neatly disguised inside an ordinary looking USB-C charging cable.

Black USB-A to USB-C cable resembling a standard charging cable, used for covert keystroke injection
BadUSB-C keystroke injection cable disguised as a standard black USB to micro-USB charging cable
Internal view of BadUSB-C cable showing ATtiny85 chip with keystroke injection features and antivirus evasion

Key Features

  • Stealth Mode: Operates undetected by antivirus software, allowing you to test and identify vulnerabilities in a controlled environment.
  • Multi-Platform Compatibility: Supports Windows, macOS, and Linux systems, ensuring versatility across different operating environments.
  • Customizable Payloads: Upload and configure your own scripts to simulate a wide range of attacks, providing a comprehensive security assessment.
  • Indistinguishable Design: Identical to a normal charging cable, providing covert operation without raising suspicion during testing.
  • Powerful Microcontroller: Equipped with a 16.5 MHz 8-bit ATtiny85 microcontroller with 8KB of program space, ensuring reliable performance and ample capacity for complex payloads.

Applications

  • Penetration Testing: Evaluate the security posture of your organization by simulating cyber-attacks.
  • Security Training: Enhance your team’s skills with practical, hands-on experience in identifying and mitigating threats.
  • Vulnerability Assessment: Identify weaknesses in your systems before malicious actors can exploit them.
Stack of various smart devices with compatibility icons for Windows, macOS, Linux, and Android systems
Diagram showing keystroke injection functionality of BadUSB-C cable along with its ability to power USB-C devices
BadUSB cable appearing identical to a standard USB charging cable being plugged into a laptop USB-A port

Setting up your BadUSB-C cable in 3 steps!

Step 1

Download the Arduino IDE

Download and install the latest Arduino IDE for your Windows version. -> Double-click the downloaded file. -> Agree to the License Agreement -> Leave the default options checked in the Installation Options step and click Next. -> Install in the default Destination Folder -> During the installation you may receive a prompt to install the Arduino USB Driver. Click Install.Notes:The USB cover is easily removable to allow access to the chip. Grip the USB end carefully when inserting and removing. USB devices connected to the cable will not be able to send or receive data to or from the target computer.
Download the latest Arduino IDE AppImage for your Operating System. Make the downloaded file executable.Notes:The USB cover is easily removable to allow access to the chip. Grip the USB end carefully when inserting and removing. USB devices connected to the cable will not be able to send or receive data to or from the target computer.

Step 2

Adjust the Arduino IDE settings

Open the Arduino IDE from the Desktop / Start Menu.
Click File >> Preferences
Paste the following into the Additional Boards Managers URLs and click ok: https://raw.githubusercontent.com/zSecurity-org/BadUSBArduino/refs/heads/main/package_badusbarduino_index.json
Go to Tools >> Board >> Boards Manager and search for "BadUSB Cable".
Click install on the entry.
Tools >> Board >> BadUSB Cable select "BadUSB Cable".
The environment is now set up and ready.
Open the Arduino IDE from the Desktop / Start Menu.
Click File >> Preferences
Paste the following into the Additional Boards Managers URLs and click ok: https://raw.githubusercontent.com/zSecurity-org/BadUSBArduino/refs/heads/main/package_badusbarduino_index.json
Go to Tools >> Board >> Boards Manager and search for "BadUSB Cable".
Click install on the entry.
Tools >> Board >> BadUSB Cable select "BadUSB Cable".
The environment is now set up and ready.

Step 3

Upload your own Payloads

Go to Sketch >> Upload. Once compiled, you will receive a prompt to plug in the device. Video Tutorial

Complete your Pentesting Tool Set with our Bundles

BadUSB Silent Intrusion Kit

Save $5 with this bundle

► + Free 1 Month zSecurity Trial VIP membership.
$59.97

BadUSB Silent Intrusion Kit Plus

Save $5 with this bundle

► USB Data Blocker
► + Free 1 Month zSecurity Trial VIP membership.
$69.97

FAQ

What do you use this cable for?

Ethical Hackers and Cybersecurity Experts use BADUSBs/Cables for a variety of purposes including, Penetration Testing, Security Training, Incident Response Testing, Research and Development and Red Team Exercises to mention a few examples!

Does BADUSB-C Keystroke Injection Cable charge devices?

Yes the cable does charge devices that use USB-C cables. Note: this cable does support Fast Charging and above.

Additional information

Weight0.1 kg
Dimensions10 × 10 × 1 cm
Location

Estimate Delivery Time

USA

2 – 5 working days.

Canada

3 – 7 working days.

Europe

5 – 10 working days.

Asia

10 – 15 working days.

All over the world

We ship to all countries, delivery time varies, please contact us for estimate delivery time.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Privacy Overview
ZSecurity logo featuring a stylized red letter Z

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping these cookies enabled helps us to improve our website.