The world's most advanced USB attack platform. Simultaneously emulate trusted
USB devices to deploy multi-vector payloads β from plug to pwn in 7 seconds.
Computers inherently trust USB devices β keyboards, network adapters, flash drives, serial ports.
The Bash Bunny exploits this trust by emulating combinations of these devices simultaneously,
tricking targets into divulging data, exfiltrating documents, and installing backdoors.
Under the hood it's a full-featured Linux computer with a quad-core CPU and desktop-class SSD.
Flick the payload switch, plug it in, and when the LED turns green β the machine is compromised.
// Attack Modes
Multi-Vector USB Emulation
The Bash Bunny can emulate any of these trusted USB device types β alone or in powerful combinations.
β¨οΈ
HID
Keystroke injection via trusted keyboard emulation
π
ETHERNET
2 Gbit adapter with DHCP β auto-trusted as primary network
πΎ
STORAGE
Mass storage for exfiltration, binary injection & staged payloads
π
SERIAL
Dedicated serial console for root terminal access
Valid Combinations
HID + STORAGEInject keystrokes and drop or exfiltrate files simultaneously
HID + ETHERNETKeystroke injection with full network stack for C2 callbacks
ETHERNET + STORAGENetwork hijacking combined with mass data exfiltration
ECM + RNDISCross-platform Ethernet β Linux/Mac (ECM) & Windows (RNDIS)