UNIT 72784
Security & Privacy

Diabolic Drive

Stealthy, modern, wireless keystroke-injection tool in a universal, four-layer, double-sided flash-drive PCB form factor with 64 GB of storage

$17,835 raised

of $5,000 goal

356% Funded! Order Below

In stock. Order now, ships within three business days.

$115

View Purchasing Options

Recent Updates

You'll be notified about news and stock updates for this project.

Diabolic Drive is a stealthy, wireless keystroke-injection tool that can send payloads over Wi-Fi while disguised as a regular 64 GB USB flash drive. Diabolic Drive is excellent for use in cybersecurity, particularly when red teaming, as it behaves like a typical flash drive until it is wirelessly instructed to deploy keystrokes.

Diabolic Drive adheres to the standard form factor of a "universal" USB drive, allowing it to be easily concealed with an inconspicuous flash-drive enclosure. When plugged in, anyone can interact with it like a normal flash drive, and it performs just like a genuine device, with average read speeds of up to 20 Mbps and write speeds of up to 10 Mbps. This behavior helps mask its wireless keystroke-injection features. Diabolic Drive is the first off-the-shelf product that combines all of these features into a single device. As such, it opens up untold social engineering attack possibilities.

Diabolic drive can be accessed remotely over Wi-Fi. Fire your payload remotely and precisely, or pre-program the drive to deliver keystrokes when plugged in.

Choose Your Moment

By default, Diabolic Drive enters the "spectre" state, after it’s plugged in, rather than going "active" immediately. As long as it remains in that state, it appears only as a flash dive…right up until you deem it safe to expose the HID interface and begin injecting keystrokes, at which point you can initiate the attack remotely using a Wi-Fi connection to the onboard Web UI. Until then, the HID interface is completely dormant, with no unexpected behavior to detect and no abnormal logs generated.

Spoofable Hardware IDs

For maximum stealthiness, Diabolic Drive allows you to spoof the identifying information it presents when connecting as a flash-storage device or as a human-interface device (HID).

Masquerading as Flash Storage

While presenting itself as a storage device, Diabolic Drive can spoof its vendor ID (VID), product ID (PID), vendor info, product info, rev info, vendor string, product string, and serial number (SN), which makes it extremely challenging to distinguish from a regular flash drive. You can, for example, configure its vendor and product details to match any visible branding on its enclosure.

Masquerading as an HID

In order to inject keystrokes, Diabolic Drive must first present itself as an HID using its on-board ATmega32U4. When it does, it can spoof the VID and PID of a device—such as a keyboard—that was previously connected to the target. This prevents the appearance of a pop-up notification announcing the installation of a new HID. You can set and modify these identifiers on the fly using the onboard Web UI.

Features & Specifications

Diabolic Drive was designed for maximum capability and stealth, with an eye toward openness, flexibility, control, and future proofing. It contains the following components:

Comparisons

Diabolic DriveRubber DuckyO.MG CABLE BasicUSBNinja
Form Factor Flash drive Flash drive USB cable USB cable
USB Type-C Availability No Yes Available Available
Flash StorageYes (64 GB) No No No
OS DetectionYes Yes No No
Keystroke Reflection ExfiltrationYes Yes No No
Wireless ControlWi-Fi No Wi-Fi Bluetooth
Self-DestructNo No Yes No
Payload Over the Air (OTA)Yes No Yes No
OTA Firmware UpgradableYes No No No
Different Enclosures SupportYes No No No
Price$115 $100 $120 $99

Programming Options

ESP8266

ATmega32U4

Upload Arduino Sketches by directly plugging your Diabolic Drive into your computer, as ATmega32U4 has native USB support through a built-in USB transceiver that handles the USB connection.

Access ATmega32U4 Bootloader

This unique feature gives you full control over Diabolic Drive’s ATmega32U4 through the device’s USB 3.0 pins. Diabolic Drive uses a modified version of the Arduino Leonardo bootloader but is compatible with the original version as well. You can reference the schematic in our GitHub repo to learn more.

Support & Documentation

You can find project information, programming instructions, design files, and a list of firmware options in our GitHub repository.

In the Press


Ask a Question

Produced by UNIT 72784 in Cairo, Egypt.

Sold and shipped by Crowd Supply.

Diabolic Drive

stealthy wireless keystroke injection tool with 64 GB storage

$115 $8 US Shipping / $18 Worldwide

About the Team

UNIT 72784

 · 

Cybersecurity hardware company developing unique Red Teaming and Penetration Testing hardware devices.

See Also

Subscribe to the Crowd Supply newsletter, highlighting the latest creators and projects