A top and side view of the zSecurity Cactus USB device, designed to perform keystroke injection attacks over Wi-Fi, featuring a sleek white design with red accents and the zSecurity logo.

ZS Cactus WiFi Keystroke Injection BadUSB

$39.99

This is a badUSB device on steroids! Why you ask? well it enables you to:

– Looks identical to a normal charging cable.
Hack computers with BadUSB keystroke injection attacks.
Use ready payloads to get instant remote access, steal credentials, browser data and even Wi-Fi passwords.
Steal passwords of Facebook, Instagram, Linkedin and more using a fake Wi-Fi Honeypot.
– Control everything remotely from any device with a web browser over Wi-Fi.
– Run own payloads over Wi-Fi.
– Control the mouse or inject keystrikes into the target machine over Wi-Fi.
– Direct extraction of information (e.g. credentials) by visiting a URL.

150 in stock

Shipping Worldwide, dispatched within 24h of payment.

HID BadUSB Keystroke Injector

Inject keystrokes into the target computer to remotely control it.

Ready Payloads

Builtin payloads hack Windows, Linux and Apple Mac OS, steal credentials, browser data and even Wi-Fi passwords.

Wi-Fi Interface

Launch attacks, control and manage everything through a mobile-friendly web interface.

Wi-Fi Honeypot

Steal login information through a fake Wi-Fi network (Honeypot).

Cross-Platform Compatibility

Compatible with Windows, Linux, and Mac OS.

ZS Cactus WiFi Keystroke Injection BadUSB

The ZS Cactus combines keystroke injection capabilities and Wi-Fi phishing with wireless control for comprehensive security assessments.

USB-A BadUSB device based on Atmega32u4 and ESP-12S microcontrollers, used for keystroke injection and wireless attacks
A top and side view of the zSecurity Cactus USB device, designed to perform keystroke injection attacks over Wi-Fi, featuring a sleek white design with red accents and the zSecurity logo.
Close-up of Wi-Fi BadUSB device for keystroke injection and wireless penetration testing
Internal view of Cactus BadUSB showing ESP-12S Wi-Fi module and Atmega32u4 microcontroller

Key Features

  • HID Keystroke Injection: Emulates a keyboard and inject automated keystrokes via USB or Wi-Fi to hack the target, steal data from it or remotely control it.
  • Ready Payloads: Get instant access, steal credentials, browser data and even Wi-Fi passwords with a few clicks.
  • Wi-Fi Honeypot: Create a fake/rogue wireless network to steal login information from connected devices.
  • Web Interface: Launch attacks, control and manage everything through a mobile-friendly web interface..
  • Remote Mouse & Keyboard Control: Remotely controls cursor movement and keystroke input.
  • Wireless Payload Execution: Delivers and triggers payloads over Wi-Fi connections for remote deployment.
  • Direct Data Extraction: Retrieves or exfiltrates files and data via URL, FTP, or similar transfer protocols.
  • Multi-Platform Compatibility: Works with Windows, Linux, and Apple Mac OS

Applications

  • Hack computers using built-in or own payloads using BadUSB attacks.
  • Steal login information of Facebook, Instagram, Linkedin and more using the Fake Wi-Fi Honeypot.
  • Control everything remotely using a web-interface from any device with a web browser!
Wi-Fi keystroke injection USB device remotely hacking a laptop with red "HACKED" screen
Fake Wi-Fi USB device phishing login credentials from a laptop using wireless signal spoofing
USB port with compatibility icons for Windows, macOS, Linux, Android, and more — supports keyboard input and keystroke devices

Honeypot Mode

This mode can be used to steal login credentials. It creates a fake WiFi network that asks clients to login using their social media account to access the internet. It can also be configured to serve custom HTML pages to hook the connected clients to BeEF or steal other data.

Connect to the fake access point, disregard the login prompt and navigate to http://192.168.1.1/home to access the command center. Navigate to “Storage” and you should have a file named “honeypot-log.txt”.

Honeypot settings screen from ZS Cactus BadUSB showing fake Wi-Fi configuration and social login phishing options

Built-in Payloads

ZS Cactus comes with 10 built-in payloads for Windows, Linux and OSX.

These payloads can be used to gain full control over the target system, steal browser data including saved passwords, steal stored Wi-Fi passwords and even download and execute any file you want!

 

Dropdown menu of built-in payloads in ZS Cactus BadUSB interface including reverse shells, credential grabbers, and download-and-execute options for Windows, Linux, and macOS

Wi-Fi Control Center

ZS Cactus can be configured and controlled over Wi-Fi using a mobile-friendly web interface. Simply connect the device to a USB power supply and connect to it’s  Wi-Fi network “ZSCactus“. The default password which can be changed from the settings is “zscactus“. Once connected open up a web browser and navigate to http://192.168.1.1/ to access the control center. The default credentials are “admin” / “zscactus”.

ZS Cactus BadUSB web interface showing firmware info and built-in payload options including Windows credentials grabber

Payloads

This page allows you to manage your payloads, you can upload, run or delete custom payloads.

You can also set a payload to auto run when the device is connected to a computer.

ZS Cactus BadUSB interface for converting Ducky Script to compatible payload format with script editor and execution panel

Setting up your ZS Cactus

Complete your Pentesting Tool Set with our Bundle

BadUSB Silent Intrusion Kit

Save $10 with this bundle

► + Free 1 Month zSecurity Trial VIP membership.
$59.97

BadUSB Silent Intrusion Kit Plus

Save $10 with this bundle

► USB Data Blocker
► + Free 1 Month zSecurity Trial VIP membership.
$69.97

FAQ

What do you use the ZS Cactus WiFi Keystroke Injection BadUSB for?

Ethical Hackers and Cybersecurity Experts use the ZS Cactus WiFi Keystroke Injection BadUSB for various purposes, including simulating USB-based attacks, testing endpoint and physical security, conducting social engineering exercises, raising user awareness, and assessing incident response capabilities, among other critical security functions!

Can antivirus software detect and block ZS Cactus WiFi Keystroke Injection BadUSB attacks?

BadUSB attacks operate at the firmware level, which is much harder for standard antivirus software to detect, as the device appears to the operating system as a legitimate keyboard.

Additional information

Weight0.1 kg
Dimensions10 × 10 × 1 cm
Location

Estimate Delivery Time

USA

2 – 5 working days.

Canada

3 – 7 working days.

Europe

5 – 10 working days.

Asia

10 – 15 working days.

All over the world

We ship to all countries, delivery time varies, please contact us for estimate delivery time.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

0
Privacy Overview
ZSecurity logo featuring a stylized red letter Z

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping these cookies enabled helps us to improve our website.